Data Discovery Identify SSL Decrypt Two-Factor Authentication Recover Detect Patch Management Security Awareness Training Phishing Least Privilege Vishing smishing Secure Email Risk Assessment Secure Password Malware Advanced Persistent Threat Whaling spearphishing Firewall Antivirus Respond Asset Management PassPhase VPN Spear Phishing Types of Hackers Zero Day Protect Data Discovery Identify SSL Decrypt Two-Factor Authentication Recover Detect Patch Management Security Awareness Training Phishing Least Privilege Vishing smishing Secure Email Risk Assessment Secure Password Malware Advanced Persistent Threat Whaling spearphishing Firewall Antivirus Respond Asset Management PassPhase VPN Spear Phishing Types of Hackers Zero Day Protect
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Discovery
Identify
SSL Decrypt
Two-Factor Authentication
Recover
Detect
Patch Management
Security Awareness Training
Phishing
Least Privilege
Vishing
smishing
Secure Email
Risk Assessment
Secure Password
Malware
Advanced Persistent Threat
Whaling
spearphishing
Firewall
Antivirus
Respond
Asset Management
PassPhase
VPN
Spear Phishing
Types of Hackers
Zero Day
Protect