spearphishing smishing Asset Management Secure Password VPN Detect Protect Whaling Security Awareness Training PassPhase Secure Email Antivirus Advanced Persistent Threat Types of Hackers Least Privilege Zero Day Firewall Malware Respond Risk Assessment Recover Vishing Spear Phishing Two-Factor Authentication SSL Decrypt Identify Data Discovery Phishing Patch Management spearphishing smishing Asset Management Secure Password VPN Detect Protect Whaling Security Awareness Training PassPhase Secure Email Antivirus Advanced Persistent Threat Types of Hackers Least Privilege Zero Day Firewall Malware Respond Risk Assessment Recover Vishing Spear Phishing Two-Factor Authentication SSL Decrypt Identify Data Discovery Phishing Patch Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
spearphishing
smishing
Asset Management
Secure Password
VPN
Detect
Protect
Whaling
Security Awareness Training
PassPhase
Secure Email
Antivirus
Advanced Persistent Threat
Types of Hackers
Least Privilege
Zero Day
Firewall
Malware
Respond
Risk Assessment
Recover
Vishing
Spear Phishing
Two-Factor Authentication
SSL Decrypt
Identify
Data Discovery
Phishing
Patch Management