Least Privilege Patch Management Two-Factor Authentication Identify Types of Hackers Antivirus Risk Assessment Detect Secure Email Spear Phishing Security Awareness Training PassPhase Phishing SSL Decrypt Firewall Malware Protect VPN Secure Password Asset Management Respond Data Discovery Recover Advanced Persistent Threat Least Privilege Patch Management Two-Factor Authentication Identify Types of Hackers Antivirus Risk Assessment Detect Secure Email Spear Phishing Security Awareness Training PassPhase Phishing SSL Decrypt Firewall Malware Protect VPN Secure Password Asset Management Respond Data Discovery Recover Advanced Persistent Threat
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-Least Privilege
G-Patch Management
O-Two-Factor Authentication
G-Identify
B-Types of Hackers
N-Antivirus
I-Risk Assessment
O-Detect
N-Secure Email
I-Spear Phishing
I-Security Awareness Training
B-PassPhase
I-Phishing
B-SSL Decrypt
B-Firewall
G-Malware
G-Protect
B-VPN
I-Secure Password
N-Asset Management
G-Respond
O-Data Discovery
O-Recover
N-Advanced Persistent Threat