Antivirus spearphishing Risk Assessment smishing Zero Day Data Discovery Recover PassPhase Security Awareness Training Firewall Identify Spear Phishing Secure Password Vishing Secure Email Patch Management Respond Types of Hackers Malware Two-Factor Authentication VPN Whaling Advanced Persistent Threat Detect Protect Phishing SSL Decrypt Least Privilege Asset Management Antivirus spearphishing Risk Assessment smishing Zero Day Data Discovery Recover PassPhase Security Awareness Training Firewall Identify Spear Phishing Secure Password Vishing Secure Email Patch Management Respond Types of Hackers Malware Two-Factor Authentication VPN Whaling Advanced Persistent Threat Detect Protect Phishing SSL Decrypt Least Privilege Asset Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Antivirus
spearphishing
Risk Assessment
smishing
Zero Day
Data Discovery
Recover
PassPhase
Security Awareness Training
Firewall
Identify
Spear Phishing
Secure Password
Vishing
Secure Email
Patch Management
Respond
Types of Hackers
Malware
Two-Factor Authentication
VPN
Whaling
Advanced Persistent Threat
Detect
Protect
Phishing
SSL Decrypt
Least Privilege
Asset Management