Cybersecurity Landscape data privacy Policy Guidelines data Vulnerability Access Control Internal Use backup Spear Phishing information classification standards cookies Phishing Password Smishing Access Control Policy digital data Procedures database DPA Standards server security awareness Information Security Threat Landscape vulnerability Social Media Scams critical files GDPR SLA Risk lockout Pretexting Virus information systems BYOD restricted SDLC compromise Networks confidential Social Engineering security Scam data security lockout accountability Worm Phishing Trojan 12 characters Threat Sensitive payment option 80/20 Vishing MFA Breach Ransomware PII Cybersecurity Landscape data privacy Policy Guidelines data Vulnerability Access Control Internal Use backup Spear Phishing information classification standards cookies Phishing Password Smishing Access Control Policy digital data Procedures database DPA Standards server security awareness Information Security Threat Landscape vulnerability Social Media Scams critical files GDPR SLA Risk lockout Pretexting Virus information systems BYOD restricted SDLC compromise Networks confidential Social Engineering security Scam data security lockout accountability Worm Phishing Trojan 12 characters Threat Sensitive payment option 80/20 Vishing MFA Breach Ransomware PII
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity Landscape
data privacy
Policy
Guidelines
data
Vulnerability
Access Control
Internal Use
backup
Spear Phishing
information classification standards
cookies
Phishing
Password
Smishing
Access Control Policy
digital data
Procedures
database
DPA
Standards
server
security awareness
Information Security
Threat Landscape
vulnerability
Social Media Scams
critical files
GDPR
SLA
Risk
lockout
Pretexting
Virus
information systems
BYOD
restricted
SDLC
compromise
Networks
confidential
Social Engineering
security
Scam
data security
lockout
accountability
Worm
Phishing
Trojan
12 characters
Threat
Sensitive
payment option
80/20
Vishing
MFA
Breach
Ransomware
PII