Secure Password Asset Management Two-Factor Authentication Phishing Security Awareness Training Patch Management Least Privilege Malware Firewall Protect Identify Types of Hackers Data Discovery VPN Respond SSL Decrypt Advanced Persistent Threat Detect Recover PassPhase Risk Assessment Secure Email Antivirus Spear Phishing Secure Password Asset Management Two-Factor Authentication Phishing Security Awareness Training Patch Management Least Privilege Malware Firewall Protect Identify Types of Hackers Data Discovery VPN Respond SSL Decrypt Advanced Persistent Threat Detect Recover PassPhase Risk Assessment Secure Email Antivirus Spear Phishing
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Secure Password
N-Asset Management
O-Two-Factor Authentication
I-Phishing
I-Security Awareness Training
G-Patch Management
O-Least Privilege
G-Malware
B-Firewall
G-Protect
G-Identify
B-Types of Hackers
O-Data Discovery
B-VPN
G-Respond
B-SSL Decrypt
N-Advanced Persistent Threat
O-Detect
O-Recover
B-PassPhase
I-Risk Assessment
N-Secure Email
N-Antivirus
I-Spear Phishing