habits Internet of Things Artificial Intelligence Supply Chain email protocol Asset Inventory 5G Network Smartphone Weak Password network infosec Cybersecurity Expertise Best Practices Clean desk cyber attacks Insider Threats personal device Wanna Cry Attack antivirus Access rights Cyber Hygiene Mobile Banking Malware Organizations multi-factor authenticator Threat Landscape Corporate Security Malicious Software Phishing Vulnerabilities Third- party Risk Targeted Ransomware BYOD Policy malicious email Social Engineering Attack Zero Trust systems disinformation Online Security Cybersecurity Authentication Infrastucture PII Cybercriminals Business Sensitive data unknown resources Data security unsecured connection Cybercrime password manager Cybersecurity Awareness Program Virtual Private Network Cyber Warfare Organization Confidence Cyberthreats Data Breach habits Internet of Things Artificial Intelligence Supply Chain email protocol Asset Inventory 5G Network Smartphone Weak Password network infosec Cybersecurity Expertise Best Practices Clean desk cyber attacks Insider Threats personal device Wanna Cry Attack antivirus Access rights Cyber Hygiene Mobile Banking Malware Organizations multi-factor authenticator Threat Landscape Corporate Security Malicious Software Phishing Vulnerabilities Third- party Risk Targeted Ransomware BYOD Policy malicious email Social Engineering Attack Zero Trust systems disinformation Online Security Cybersecurity Authentication Infrastucture PII Cybercriminals Business Sensitive data unknown resources Data security unsecured connection Cybercrime password manager Cybersecurity Awareness Program Virtual Private Network Cyber Warfare Organization Confidence Cyberthreats Data Breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
habits
Internet of Things
Artificial Intelligence
Supply Chain
email protocol
Asset Inventory
5G Network
Smartphone
Weak Password
network
infosec
Cybersecurity Expertise
Best Practices
Clean desk
cyber attacks
Insider Threats
personal device
Wanna Cry Attack
antivirus
Access rights
Cyber Hygiene
Mobile Banking Malware
Organizations
multi-factor authenticator
Threat Landscape
Corporate Security
Malicious Software
Phishing
Vulnerabilities
Third-party Risk
Targeted Ransomware
BYOD Policy
malicious email
Social Engineering Attack
Zero Trust
systems
disinformation
Online Security
Cybersecurity
Authentication
Infrastucture
PII
Cybercriminals
Business
Sensitive data
unknown resources
Data security
unsecured connection
Cybercrime
password manager
Cybersecurity Awareness Program
Virtual Private Network
Cyber Warfare
Organization Confidence
Cyberthreats
Data Breach