Data Discovery VPN Asset Management Firewall Two-Factor Authentication Phishing Detect Security Awareness Training Protect SSL Decrypt Secure Email Identify PassPhase Advanced Persistent Threat Spear Phishing Recover Respond Patch Management Least Privilege Types of Hackers Risk Assessment Secure Password Antivirus Malware Data Discovery VPN Asset Management Firewall Two-Factor Authentication Phishing Detect Security Awareness Training Protect SSL Decrypt Secure Email Identify PassPhase Advanced Persistent Threat Spear Phishing Recover Respond Patch Management Least Privilege Types of Hackers Risk Assessment Secure Password Antivirus Malware
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-Data Discovery
B-VPN
N-Asset Management
B-Firewall
O-Two-Factor Authentication
I-Phishing
O-Detect
I-Security Awareness Training
G-Protect
B-SSL Decrypt
N-Secure Email
G-Identify
B-PassPhase
N-Advanced Persistent Threat
I-Spear Phishing
O-Recover
G-Respond
G-Patch Management
O-Least Privilege
B-Types of Hackers
I-Risk Assessment
I-Secure Password
N-Antivirus
G-Malware