Patch Management Spear Phishing Risk Assessment Malware Phishing Antivirus Identify Secure Password Secure Email Two-Factor Authentication Protect VPN Respond Security Awareness Training Types of Hackers Least Privilege Data Discovery Asset Management Detect PassPhase Firewall Recover SSL Decrypt Advanced Persistent Threat Patch Management Spear Phishing Risk Assessment Malware Phishing Antivirus Identify Secure Password Secure Email Two-Factor Authentication Protect VPN Respond Security Awareness Training Types of Hackers Least Privilege Data Discovery Asset Management Detect PassPhase Firewall Recover SSL Decrypt Advanced Persistent Threat
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Patch Management
I-Spear Phishing
I-Risk Assessment
G-Malware
I-Phishing
N-Antivirus
G-Identify
I-Secure Password
N-Secure Email
O-Two-Factor Authentication
G-Protect
B-VPN
G-Respond
I-Security Awareness Training
B-Types of Hackers
O-Least Privilege
O-Data Discovery
N-Asset Management
O-Detect
B-PassPhase
B-Firewall
O-Recover
B-SSL Decrypt
N-Advanced Persistent Threat