Identify Litigation Malware Regulation Protection Threat Compliance Phishing CIP Cyber Risk Fraud Safety Vishing Media Procedures Standard Suspicious Smishing Information Email Legal Rules Whaling Authentication Links Malicious Privacy Laws Internet Ransomware Cyber Security Awareness Password Guidelines Criminal James Beeson Security Policies Minimum Necessary Social Media Identify Litigation Malware Regulation Protection Threat Compliance Phishing CIP Cyber Risk Fraud Safety Vishing Media Procedures Standard Suspicious Smishing Information Email Legal Rules Whaling Authentication Links Malicious Privacy Laws Internet Ransomware Cyber Security Awareness Password Guidelines Criminal James Beeson Security Policies Minimum Necessary Social Media
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Identify
Litigation
Malware
Regulation
Protection
Threat
Compliance
Phishing
CIP
Cyber Risk
Fraud
Safety
Vishing
Media
Procedures
Standard
Suspicious
Smishing
Information
Email
Legal
Rules
Whaling
Authentication
Links
Malicious
Privacy
Laws
Internet
Ransomware
Cyber Security
Awareness
Password
Guidelines
Criminal
James Beeson
Security
Policies
Minimum Necessary
Social Media