restricted Information Security Virus security awareness Worm Threat security Guidelines DPA MFA Risk backup Phishing Networks Password Breach Access Control GDPR BYOD Trojan Cybersecurity Landscape lockout compromise Vishing Scam payment option server data Procedures digital data database Sensitive Social Engineering Policy Smishing data security Internal Use Social Media Scams 12 characters vulnerability information classification standards Vulnerability SDLC lockout confidential data privacy information systems Spear Phishing 80/20 Access Control Policy PII Standards SLA cookies Threat Landscape critical files accountability Ransomware Phishing Pretexting restricted Information Security Virus security awareness Worm Threat security Guidelines DPA MFA Risk backup Phishing Networks Password Breach Access Control GDPR BYOD Trojan Cybersecurity Landscape lockout compromise Vishing Scam payment option server data Procedures digital data database Sensitive Social Engineering Policy Smishing data security Internal Use Social Media Scams 12 characters vulnerability information classification standards Vulnerability SDLC lockout confidential data privacy information systems Spear Phishing 80/20 Access Control Policy PII Standards SLA cookies Threat Landscape critical files accountability Ransomware Phishing Pretexting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
restricted
Information Security
Virus
security awareness
Worm
Threat
security
Guidelines
DPA
MFA
Risk
backup
Phishing
Networks
Password
Breach
Access Control
GDPR
BYOD
Trojan
Cybersecurity Landscape
lockout
compromise
Vishing
Scam
payment option
server
data
Procedures
digital data
database
Sensitive
Social Engineering
Policy
Smishing
data security
Internal Use
Social Media Scams
12 characters
vulnerability
information classification standards
Vulnerability
SDLC
lockout
confidential
data privacy
information systems
Spear Phishing
80/20
Access Control Policy
PII
Standards
SLA
cookies
Threat Landscape
critical files
accountability
Ransomware
Phishing
Pretexting