Threat Vishing Legal Criminal Procedures Social Media Cyber Security Media Malicious Internet Email Authentication Identify Awareness Standard Ransomware Phishing Links Protection Minimum Necessary Regulation Rules Information Policies Guidelines Security Malware Whaling Password CIP Smishing Privacy Safety Litigation James Beeson Fraud Suspicious Laws Cyber Risk Compliance Threat Vishing Legal Criminal Procedures Social Media Cyber Security Media Malicious Internet Email Authentication Identify Awareness Standard Ransomware Phishing Links Protection Minimum Necessary Regulation Rules Information Policies Guidelines Security Malware Whaling Password CIP Smishing Privacy Safety Litigation James Beeson Fraud Suspicious Laws Cyber Risk Compliance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat
Vishing
Legal
Criminal
Procedures
Social Media
Cyber Security
Media
Malicious
Internet
Email
Authentication
Identify
Awareness
Standard
Ransomware
Phishing
Links
Protection
Minimum Necessary
Regulation
Rules
Information
Policies
Guidelines
Security
Malware
Whaling
Password
CIP
Smishing
Privacy
Safety
Litigation
James Beeson
Fraud
Suspicious
Laws
Cyber Risk
Compliance