information classification standards data privacy Standards Phishing payment option security data Access Control Internal Use security awareness Social Media Scams cookies digital data Policy PII database Access Control Policy vulnerability confidential Procedures Smishing MFA compromise backup server Sensitive data security critical files Guidelines Information Security Cybersecurity Landscape restricted Networks information systems lockout SDLC 12 characters Password DPA BYOD GDPR information classification standards data privacy Standards Phishing payment option security data Access Control Internal Use security awareness Social Media Scams cookies digital data Policy PII database Access Control Policy vulnerability confidential Procedures Smishing MFA compromise backup server Sensitive data security critical files Guidelines Information Security Cybersecurity Landscape restricted Networks information systems lockout SDLC 12 characters Password DPA BYOD GDPR
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
information classification standards
data privacy
Standards
Phishing
payment option
security
data
Access Control
Internal Use
security awareness
Social Media Scams
cookies
digital data
Policy
PII
database
Access Control Policy
vulnerability
confidential
Procedures
Smishing
MFA
compromise
backup
server
Sensitive
data security
critical files
Guidelines
Information Security
Cybersecurity Landscape
restricted
Networks
information systems
lockout
SDLC
12 characters
Password
DPA
BYOD
GDPR