Cybersecurity Expertise Settlement Organizations Virtual Private Network Smartphone Cybersecurity Awareness Program Wanna Cry Attack Clean desk Mobile Banking Malware Organization Confidence Cyber Warfare Compliance Shared Responsibility Data security PII unsecured connection Business password manager Infrastucture Phishing Cybercriminals Access rights network Supply Chain Best Practices Authentication Culture multi-factor authenticator malicious email Fines Social Engineering Attack Artificial Intelligence personal device Corporate Security Online Security Hacks 5G Network Malicious Software Asset Inventory Cyber Hygiene Zero Trust Cybersecurity Third- party Risk Threat Landscape disinformation Data Breach Penalties 80/20 BYOD Policy Cyberthreats Sensitive data Weak Password Cybercrime Internet of Things Insider Threats antivirus cyber attacks unknown resources Targeted Ransomware email protocol Vulnerabilities Breaches habits infosec Cybersecurity Expertise Settlement Organizations Virtual Private Network Smartphone Cybersecurity Awareness Program Wanna Cry Attack Clean desk Mobile Banking Malware Organization Confidence Cyber Warfare Compliance Shared Responsibility Data security PII unsecured connection Business password manager Infrastucture Phishing Cybercriminals Access rights network Supply Chain Best Practices Authentication Culture multi-factor authenticator malicious email Fines Social Engineering Attack Artificial Intelligence personal device Corporate Security Online Security Hacks 5G Network Malicious Software Asset Inventory Cyber Hygiene Zero Trust Cybersecurity Third- party Risk Threat Landscape disinformation Data Breach Penalties 80/20 BYOD Policy Cyberthreats Sensitive data Weak Password Cybercrime Internet of Things Insider Threats antivirus cyber attacks unknown resources Targeted Ransomware email protocol Vulnerabilities Breaches habits infosec
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity Expertise
Settlement
Organizations
Virtual Private Network
Smartphone
Cybersecurity Awareness Program
Wanna Cry Attack
Clean desk
Mobile Banking Malware
Organization Confidence
Cyber Warfare
Compliance
Shared Responsibility
Data security
PII
unsecured connection
Business
password manager
Infrastucture
Phishing
Cybercriminals
Access rights
network
Supply Chain
Best Practices
Authentication
Culture
multi-factor authenticator
malicious email
Fines
Social Engineering Attack
Artificial Intelligence
personal device
Corporate Security
Online Security
Hacks
5G Network
Malicious Software
Asset Inventory
Cyber Hygiene
Zero Trust
Cybersecurity
Third-party Risk
Threat Landscape
disinformation
Data Breach
Penalties
80/20
BYOD Policy
Cyberthreats
Sensitive data
Weak Password
Cybercrime
Internet of Things
Insider Threats
antivirus
cyber attacks
unknown resources
Targeted Ransomware
email protocol
Vulnerabilities
Breaches
habits
infosec