Secure Email Protect Firewall Malware Two-Factor Authentication Risk Assessment SSL Decrypt Identify Spear Phishing Security Awareness Training VPN Secure Password Phishing Advanced Persistent Threat Least Privilege Recover Antivirus Detect Data Discovery Asset Management Types of Hackers Respond PassPhase Patch Management Secure Email Protect Firewall Malware Two-Factor Authentication Risk Assessment SSL Decrypt Identify Spear Phishing Security Awareness Training VPN Secure Password Phishing Advanced Persistent Threat Least Privilege Recover Antivirus Detect Data Discovery Asset Management Types of Hackers Respond PassPhase Patch Management
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Secure Email
G-Protect
B-Firewall
G-Malware
O-Two-Factor Authentication
I-Risk Assessment
B-SSL Decrypt
G-Identify
I-Spear Phishing
I-Security Awareness Training
B-VPN
I-Secure Password
I-Phishing
N-Advanced Persistent Threat
O-Least Privilege
O-Recover
N-Antivirus
O-Detect
O-Data Discovery
N-Asset Management
B-Types of Hackers
G-Respond
B-PassPhase
G-Patch Management