Risk Assessment Secure Email Patch Management Asset Management VPN Antivirus Two-Factor Authentication PassPhase Identify Least Privilege Security Awareness Training Malware Firewall Detect Advanced Persistent Threat Secure Password Phishing Types of Hackers Respond SSL Decrypt Spear Phishing Protect Data Discovery Recover Risk Assessment Secure Email Patch Management Asset Management VPN Antivirus Two-Factor Authentication PassPhase Identify Least Privilege Security Awareness Training Malware Firewall Detect Advanced Persistent Threat Secure Password Phishing Types of Hackers Respond SSL Decrypt Spear Phishing Protect Data Discovery Recover
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Risk Assessment
N-Secure Email
G-Patch Management
N-Asset Management
B-VPN
N-Antivirus
O-Two-Factor Authentication
B-PassPhase
G-Identify
O-Least Privilege
I-Security Awareness Training
G-Malware
B-Firewall
O-Detect
N-Advanced Persistent Threat
I-Secure Password
I-Phishing
B-Types of Hackers
G-Respond
B-SSL Decrypt
I-Spear Phishing
G-Protect
O-Data Discovery
O-Recover