Spear Phishing Malware Identify Secure Password Detect SSL Decrypt Least Privilege Advanced Persistent Threat Types of Hackers VPN Security Awareness Training Two-Factor Authentication Asset Management Data Discovery Secure Email Protect Phishing Respond PassPhase Recover Antivirus Risk Assessment Patch Management Firewall Spear Phishing Malware Identify Secure Password Detect SSL Decrypt Least Privilege Advanced Persistent Threat Types of Hackers VPN Security Awareness Training Two-Factor Authentication Asset Management Data Discovery Secure Email Protect Phishing Respond PassPhase Recover Antivirus Risk Assessment Patch Management Firewall
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Spear Phishing
G-Malware
G-Identify
I-Secure Password
O-Detect
B-SSL Decrypt
O-Least Privilege
N-Advanced Persistent Threat
B-Types of Hackers
B-VPN
I-Security Awareness Training
O-Two-Factor Authentication
N-Asset Management
O-Data Discovery
N-Secure Email
G-Protect
I-Phishing
G-Respond
B-PassPhase
O-Recover
N-Antivirus
I-Risk Assessment
G-Patch Management
B-Firewall