Sensitive Access Control Policy BYOD digital data Procedures PII database data server Password payment option MFA security backup Networks Smishing data privacy Information Security Standards information systems information classification standards restricted data security SDLC Cybersecurity Landscape Policy 12 characters DPA Internal Use GDPR confidential critical files Access Control lockout Guidelines compromise vulnerability Social Media Scams Phishing security awareness cookies Sensitive Access Control Policy BYOD digital data Procedures PII database data server Password payment option MFA security backup Networks Smishing data privacy Information Security Standards information systems information classification standards restricted data security SDLC Cybersecurity Landscape Policy 12 characters DPA Internal Use GDPR confidential critical files Access Control lockout Guidelines compromise vulnerability Social Media Scams Phishing security awareness cookies
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Sensitive
Access Control Policy
BYOD
digital data
Procedures
PII
database
data
server
Password
payment option
MFA
security
backup
Networks
Smishing
data privacy
Information Security
Standards
information systems
information classification standards
restricted
data security
SDLC
Cybersecurity Landscape
Policy
12 characters
DPA
Internal Use
GDPR
confidential
critical files
Access Control
lockout
Guidelines
compromise
vulnerability
Social Media Scams
Phishing
security awareness
cookies