Risk Assessment Data Discovery Secure Password Detect Protect Security Awareness Training Types of Hackers Least Privilege Identify Firewall Respond Patch Management SSL Decrypt Asset Management Secure Email Advanced Persistent Threat Spear Phishing PassPhase Recover Two-Factor Authentication Antivirus Malware Phishing VPN Risk Assessment Data Discovery Secure Password Detect Protect Security Awareness Training Types of Hackers Least Privilege Identify Firewall Respond Patch Management SSL Decrypt Asset Management Secure Email Advanced Persistent Threat Spear Phishing PassPhase Recover Two-Factor Authentication Antivirus Malware Phishing VPN
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Risk Assessment
O-Data Discovery
I-Secure Password
O-Detect
G-Protect
I-Security Awareness Training
B-Types of Hackers
O-Least Privilege
G-Identify
B-Firewall
G-Respond
G-Patch Management
B-SSL Decrypt
N-Asset Management
N-Secure Email
N-Advanced Persistent Threat
I-Spear Phishing
B-PassPhase
O-Recover
O-Two-Factor Authentication
N-Antivirus
G-Malware
I-Phishing
B-VPN