Secure Email Security Awareness Training Respond Malware Secure Password PassPhase VPN Types of Hackers Asset Management Least Privilege Data Discovery Spear Phishing Antivirus Firewall Phishing Advanced Persistent Threat Recover Protect Detect Patch Management Identify SSL Decrypt Risk Assessment Two-Factor Authentication Secure Email Security Awareness Training Respond Malware Secure Password PassPhase VPN Types of Hackers Asset Management Least Privilege Data Discovery Spear Phishing Antivirus Firewall Phishing Advanced Persistent Threat Recover Protect Detect Patch Management Identify SSL Decrypt Risk Assessment Two-Factor Authentication
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Secure Email
I-Security Awareness Training
G-Respond
G-Malware
I-Secure Password
B-PassPhase
B-VPN
B-Types of Hackers
N-Asset Management
O-Least Privilege
O-Data Discovery
I-Spear Phishing
N-Antivirus
B-Firewall
I-Phishing
N-Advanced Persistent Threat
O-Recover
G-Protect
O-Detect
G-Patch Management
G-Identify
B-SSL Decrypt
I-Risk Assessment
O-Two-Factor Authentication