confidential vulnerability Procedures MFA server SDLC information systems information classification standards Phishing lockout PII data security security awareness compromise digital data Standards Smishing backup security Information Security GDPR critical files data privacy Guidelines Social Media Scams Access Control Policy payment option Internal Use Password Cybersecurity Landscape DPA BYOD database Networks 12 characters cookies Access Control Sensitive Policy data restricted confidential vulnerability Procedures MFA server SDLC information systems information classification standards Phishing lockout PII data security security awareness compromise digital data Standards Smishing backup security Information Security GDPR critical files data privacy Guidelines Social Media Scams Access Control Policy payment option Internal Use Password Cybersecurity Landscape DPA BYOD database Networks 12 characters cookies Access Control Sensitive Policy data restricted
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
confidential
vulnerability
Procedures
MFA
server
SDLC
information systems
information classification standards
Phishing
lockout
PII
data security
security awareness
compromise
digital data
Standards
Smishing
backup
security
Information Security
GDPR
critical files
data privacy
Guidelines
Social Media Scams
Access Control Policy
payment option
Internal Use
Password
Cybersecurity Landscape
DPA
BYOD
database
Networks
12 characters
cookies
Access Control
Sensitive
Policy
data
restricted