Procedures vulnerability Information Security Access Control security awareness lockout GDPR security Access Control Policy compromise data privacy Guidelines Internal Use digital data BYOD data Sensitive Networks cookies Password Social Media Scams payment option information classification standards PII DPA restricted data security Standards critical files Cybersecurity Landscape confidential information systems database backup SDLC Phishing Policy MFA 12 characters Smishing server Procedures vulnerability Information Security Access Control security awareness lockout GDPR security Access Control Policy compromise data privacy Guidelines Internal Use digital data BYOD data Sensitive Networks cookies Password Social Media Scams payment option information classification standards PII DPA restricted data security Standards critical files Cybersecurity Landscape confidential information systems database backup SDLC Phishing Policy MFA 12 characters Smishing server
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Procedures
vulnerability
Information Security
Access Control
security awareness
lockout
GDPR
security
Access Control Policy
compromise
data privacy
Guidelines
Internal Use
digital data
BYOD
data
Sensitive
Networks
cookies
Password
Social Media Scams
payment option
information classification standards
PII
DPA
restricted
data security
Standards
critical files
Cybersecurity Landscape
confidential
information systems
database
backup
SDLC
Phishing
Policy
MFA
12 characters
Smishing
server