Access Control Policy cookies 12 characters data privacy Phishing restricted Smishing security Procedures confidential data security awareness Sensitive lockout Networks vulnerability GDPR MFA SDLC Access Control Information Security compromise information systems critical files information classification standards BYOD database Password server digital data backup payment option Cybersecurity Landscape Policy data security PII Internal Use Social Media Scams DPA Standards Guidelines Access Control Policy cookies 12 characters data privacy Phishing restricted Smishing security Procedures confidential data security awareness Sensitive lockout Networks vulnerability GDPR MFA SDLC Access Control Information Security compromise information systems critical files information classification standards BYOD database Password server digital data backup payment option Cybersecurity Landscape Policy data security PII Internal Use Social Media Scams DPA Standards Guidelines
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Access Control Policy
cookies
12 characters
data privacy
Phishing
restricted
Smishing
security
Procedures
confidential
data
security awareness
Sensitive
lockout
Networks
vulnerability
GDPR
MFA
SDLC
Access Control
Information Security
compromise
information systems
critical files
information classification standards
BYOD
database
Password
server
digital data
backup
payment option
Cybersecurity Landscape
Policy
data security
PII
Internal Use
Social Media Scams
DPA
Standards
Guidelines