Guidelines digital data Standards MFA Password Access Control Phishing payment option security awareness data privacy vulnerability GDPR cookies SDLC information systems Policy Procedures backup Networks data security restricted PII database Sensitive information classification standards BYOD critical files 12 characters security Information Security lockout server data Cybersecurity Landscape Internal Use Social Media Scams Smishing confidential Access Control Policy DPA compromise Guidelines digital data Standards MFA Password Access Control Phishing payment option security awareness data privacy vulnerability GDPR cookies SDLC information systems Policy Procedures backup Networks data security restricted PII database Sensitive information classification standards BYOD critical files 12 characters security Information Security lockout server data Cybersecurity Landscape Internal Use Social Media Scams Smishing confidential Access Control Policy DPA compromise
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Guidelines
digital data
Standards
MFA
Password
Access Control
Phishing
payment option
security awareness
data privacy
vulnerability
GDPR
cookies
SDLC
information systems
Policy
Procedures
backup
Networks
data security
restricted
PII
database
Sensitive
information classification standards
BYOD
critical files
12 characters
security
Information Security
lockout
server
data
Cybersecurity Landscape
Internal Use
Social Media Scams
Smishing
confidential
Access Control Policy
DPA
compromise