Cybersecurity Wanna Cry Attack disinformation email protocol cyber attacks Supply Chain Cyber Hygiene Weak Password Infrastucture unsecured connection Organization Confidence 80/20 Breaches Social Engineering Attack Cybersecurity Expertise PII Clean desk Access rights infosec 5G Network Phishing Internet of Things Shared Responsibility Settlement Organizations Artificial Intelligence habits Malicious Software network Hacks Cybersecurity Awareness Program Authentication Culture Targeted Ransomware Vulnerabilities multi-factor authenticator Penalties Insider Threats Threat Landscape Best Practices Sensitive data systems personal device Business BYOD Policy Data Breach Cybercrime Mobile Banking Malware unknown resources Compliance Corporate Security malicious email Third- party Risk antivirus Zero Trust Online Security Cybercriminals Asset Inventory Smartphone password manager Cyberthreats Cyber Warfare Data security Virtual Private Network Fines Cybersecurity Wanna Cry Attack disinformation email protocol cyber attacks Supply Chain Cyber Hygiene Weak Password Infrastucture unsecured connection Organization Confidence 80/20 Breaches Social Engineering Attack Cybersecurity Expertise PII Clean desk Access rights infosec 5G Network Phishing Internet of Things Shared Responsibility Settlement Organizations Artificial Intelligence habits Malicious Software network Hacks Cybersecurity Awareness Program Authentication Culture Targeted Ransomware Vulnerabilities multi-factor authenticator Penalties Insider Threats Threat Landscape Best Practices Sensitive data systems personal device Business BYOD Policy Data Breach Cybercrime Mobile Banking Malware unknown resources Compliance Corporate Security malicious email Third- party Risk antivirus Zero Trust Online Security Cybercriminals Asset Inventory Smartphone password manager Cyberthreats Cyber Warfare Data security Virtual Private Network Fines
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity
Wanna Cry Attack
disinformation
email protocol
cyber attacks
Supply Chain
Cyber Hygiene
Weak Password
Infrastucture
unsecured connection
Organization Confidence
80/20
Breaches
Social Engineering Attack
Cybersecurity Expertise
PII
Clean desk
Access rights
infosec
5G Network
Phishing
Internet of Things
Shared Responsibility
Settlement
Organizations
Artificial Intelligence
habits
Malicious Software
network
Hacks
Cybersecurity Awareness Program
Authentication
Culture
Targeted Ransomware
Vulnerabilities
multi-factor authenticator
Penalties
Insider Threats
Threat Landscape
Best Practices
Sensitive data
systems
personal device
Business
BYOD Policy
Data Breach
Cybercrime
Mobile Banking Malware
unknown resources
Compliance
Corporate Security
malicious email
Third-party Risk
antivirus
Zero Trust
Online Security
Cybercriminals
Asset Inventory
Smartphone
password manager
Cyberthreats
Cyber Warfare
Data security
Virtual Private Network
Fines