cookies GDPR payment option restricted data privacy Networks information systems Smishing data compromise server 12 characters Procedures Access Control Internal Use lockout Sensitive SDLC data security Password PII information classification standards Information Security Social Media Scams database backup Cybersecurity Landscape Access Control Policy DPA security security awareness Policy Phishing MFA vulnerability digital data Standards critical files confidential BYOD Guidelines cookies GDPR payment option restricted data privacy Networks information systems Smishing data compromise server 12 characters Procedures Access Control Internal Use lockout Sensitive SDLC data security Password PII information classification standards Information Security Social Media Scams database backup Cybersecurity Landscape Access Control Policy DPA security security awareness Policy Phishing MFA vulnerability digital data Standards critical files confidential BYOD Guidelines
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
cookies
GDPR
payment option
restricted
data privacy
Networks
information systems
Smishing
data
compromise
server
12 characters
Procedures
Access Control
Internal Use
lockout
Sensitive
SDLC
data security
Password
PII
information classification standards
Information Security
Social Media Scams
database
backup
Cybersecurity Landscape
Access Control Policy
DPA
security
security awareness
Policy
Phishing
MFA
vulnerability
digital data
Standards
critical files
confidential
BYOD
Guidelines