5G Network Infrastucture Best Practices Cyber Hygiene Business Breaches Mobile Banking Malware 80/20 Supply Chain email protocol Phishing habits Organization Confidence Online Security Weak Password Wanna Cry Attack PII Penalties Cyberthreats Data security Vulnerabilities Corporate Security disinformation unknown resources antivirus Threat Landscape unsecured connection Cybersecurity Awareness Program Shared Responsibility cyber attacks Settlement Targeted Ransomware Compliance Hacks Zero Trust Third- party Risk Cyber Warfare Malicious Software Organizations Cybercrime Clean desk Cybercriminals network Virtual Private Network Cybersecurity Asset Inventory Internet of Things Fines Artificial Intelligence personal device multi-factor authenticator Culture infosec Social Engineering Attack Data Breach malicious email Cybersecurity Expertise Smartphone BYOD Policy Authentication password manager Sensitive data Access rights Insider Threats 5G Network Infrastucture Best Practices Cyber Hygiene Business Breaches Mobile Banking Malware 80/20 Supply Chain email protocol Phishing habits Organization Confidence Online Security Weak Password Wanna Cry Attack PII Penalties Cyberthreats Data security Vulnerabilities Corporate Security disinformation unknown resources antivirus Threat Landscape unsecured connection Cybersecurity Awareness Program Shared Responsibility cyber attacks Settlement Targeted Ransomware Compliance Hacks Zero Trust Third- party Risk Cyber Warfare Malicious Software Organizations Cybercrime Clean desk Cybercriminals network Virtual Private Network Cybersecurity Asset Inventory Internet of Things Fines Artificial Intelligence personal device multi-factor authenticator Culture infosec Social Engineering Attack Data Breach malicious email Cybersecurity Expertise Smartphone BYOD Policy Authentication password manager Sensitive data Access rights Insider Threats
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
5G Network
Infrastucture
Best Practices
Cyber Hygiene
Business
Breaches
Mobile Banking Malware
80/20
Supply Chain
email protocol
Phishing
habits
Organization Confidence
Online Security
Weak Password
Wanna Cry Attack
PII
Penalties
Cyberthreats
Data security
Vulnerabilities
Corporate Security
disinformation
unknown resources
antivirus
Threat Landscape
unsecured connection
Cybersecurity Awareness Program
Shared Responsibility
cyber attacks
Settlement
Targeted Ransomware
Compliance
Hacks
Zero Trust
Third-party Risk
Cyber Warfare
Malicious Software
Organizations
Cybercrime
Clean desk
Cybercriminals
network
Virtual Private Network
Cybersecurity
Asset Inventory
Internet of Things
Fines
Artificial Intelligence
personal device
multi-factor authenticator
Culture
infosec
Social Engineering Attack
Data Breach
malicious email
Cybersecurity Expertise
Smartphone
BYOD Policy
Authentication
password manager
Sensitive data
Access rights
Insider Threats