Spear Phishing server Ransomware restricted information classification standards Smishing Social Engineering PII vulnerability security awareness data security backup Breach Phishing information systems GDPR Information Security security BYOD Phishing lockout Vulnerability data data privacy 12 characters Sensitive compromise Access Control Policy Access Control Password Trojan Virus MFA critical files cookies Pretexting Scam payment option confidential 80/20 Guidelines Social Media Scams digital data Threat Networks Policy Internal Use lockout SDLC SLA Standards Vishing Threat Landscape Procedures Cybersecurity Landscape DPA Worm Risk database accountability Spear Phishing server Ransomware restricted information classification standards Smishing Social Engineering PII vulnerability security awareness data security backup Breach Phishing information systems GDPR Information Security security BYOD Phishing lockout Vulnerability data data privacy 12 characters Sensitive compromise Access Control Policy Access Control Password Trojan Virus MFA critical files cookies Pretexting Scam payment option confidential 80/20 Guidelines Social Media Scams digital data Threat Networks Policy Internal Use lockout SDLC SLA Standards Vishing Threat Landscape Procedures Cybersecurity Landscape DPA Worm Risk database accountability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spear Phishing
server
Ransomware
restricted
information classification standards
Smishing
Social Engineering
PII
vulnerability
security awareness
data security
backup
Breach
Phishing
information systems
GDPR
Information Security
security
BYOD
Phishing
lockout
Vulnerability
data
data privacy
12 characters
Sensitive
compromise
Access Control Policy
Access Control
Password
Trojan
Virus
MFA
critical files
cookies
Pretexting
Scam
payment option
confidential
80/20
Guidelines
Social Media Scams
digital data
Threat
Networks
Policy
Internal Use
lockout
SDLC
SLA
Standards
Vishing
Threat Landscape
Procedures
Cybersecurity Landscape
DPA
Worm
Risk
database
accountability