Patch Management Secure Email VPN Advanced Persistent Threat Two-Factor Authentication Data Discovery Phishing Detect Risk Assessment Recover Least Privilege Protect Antivirus Malware Types of Hackers PassPhase Respond Asset Management Secure Password Security Awareness Training SSL Decrypt Identify Firewall Spear Phishing Patch Management Secure Email VPN Advanced Persistent Threat Two-Factor Authentication Data Discovery Phishing Detect Risk Assessment Recover Least Privilege Protect Antivirus Malware Types of Hackers PassPhase Respond Asset Management Secure Password Security Awareness Training SSL Decrypt Identify Firewall Spear Phishing
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Patch Management
N-Secure Email
B-VPN
N-Advanced Persistent Threat
O-Two-Factor Authentication
O-Data Discovery
I-Phishing
O-Detect
I-Risk Assessment
O-Recover
O-Least Privilege
G-Protect
N-Antivirus
G-Malware
B-Types of Hackers
B-PassPhase
G-Respond
N-Asset Management
I-Secure Password
I-Security Awareness Training
B-SSL Decrypt
G-Identify
B-Firewall
I-Spear Phishing