Sensitive data Supply Chain Shared Responsibility infosec Online Security unknown resources Cyber Warfare cyber attacks personal device Cyber Hygiene Phishing Mobile Banking Malware Cybersecurity Expertise Internet of Things Wanna Cry Attack disinformation Settlement multi-factor authenticator Asset Inventory Insider Threats Infrastucture Cybercriminals 80/20 Corporate Security Fines network Cybercrime Authentication habits antivirus unsecured connection Compliance email protocol Cybersecurity Targeted Ransomware Data security Organization Confidence Organizations malicious email Clean desk Malicious Software Zero Trust Smartphone password manager Virtual Private Network Culture Penalties Data Breach Social Engineering Attack Hacks Threat Landscape Access rights BYOD Policy 5G Network Third- party Risk systems Vulnerabilities Business Best Practices Artificial Intelligence PII Cybersecurity Awareness Program Breaches Cyberthreats Weak Password Sensitive data Supply Chain Shared Responsibility infosec Online Security unknown resources Cyber Warfare cyber attacks personal device Cyber Hygiene Phishing Mobile Banking Malware Cybersecurity Expertise Internet of Things Wanna Cry Attack disinformation Settlement multi-factor authenticator Asset Inventory Insider Threats Infrastucture Cybercriminals 80/20 Corporate Security Fines network Cybercrime Authentication habits antivirus unsecured connection Compliance email protocol Cybersecurity Targeted Ransomware Data security Organization Confidence Organizations malicious email Clean desk Malicious Software Zero Trust Smartphone password manager Virtual Private Network Culture Penalties Data Breach Social Engineering Attack Hacks Threat Landscape Access rights BYOD Policy 5G Network Third- party Risk systems Vulnerabilities Business Best Practices Artificial Intelligence PII Cybersecurity Awareness Program Breaches Cyberthreats Weak Password
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Sensitive data
Supply Chain
Shared Responsibility
infosec
Online Security
unknown resources
Cyber Warfare
cyber attacks
personal device
Cyber Hygiene
Phishing
Mobile Banking Malware
Cybersecurity Expertise
Internet of Things
Wanna Cry Attack
disinformation
Settlement
multi-factor authenticator
Asset Inventory
Insider Threats
Infrastucture
Cybercriminals
80/20
Corporate Security
Fines
network
Cybercrime
Authentication
habits
antivirus
unsecured connection
Compliance
email protocol
Cybersecurity
Targeted Ransomware
Data security
Organization Confidence
Organizations
malicious email
Clean desk
Malicious Software
Zero Trust
Smartphone
password manager
Virtual Private Network
Culture
Penalties
Data Breach
Social Engineering Attack
Hacks
Threat Landscape
Access rights
BYOD Policy
5G Network
Third-party Risk
systems
Vulnerabilities
Business
Best Practices
Artificial Intelligence
PII
Cybersecurity Awareness Program
Breaches
Cyberthreats
Weak Password