accountability information classification standards Information Security payment option Phishing Access Control Policy data privacy Guidelines restricted data security Internal Use SLA Ransomware confidential Risk Worm Social Engineering BYOD Sensitive SDLC compromise security vulnerability 12 characters Threat DPA Threat Landscape server Smishing Spear Phishing Password lockout Social Media Scams data Vulnerability Pretexting Phishing Virus Scam Trojan 80/20 Policy critical files MFA Access Control Standards Breach digital data PII Cybersecurity Landscape cookies security awareness backup information systems GDPR Vishing Procedures lockout database Networks accountability information classification standards Information Security payment option Phishing Access Control Policy data privacy Guidelines restricted data security Internal Use SLA Ransomware confidential Risk Worm Social Engineering BYOD Sensitive SDLC compromise security vulnerability 12 characters Threat DPA Threat Landscape server Smishing Spear Phishing Password lockout Social Media Scams data Vulnerability Pretexting Phishing Virus Scam Trojan 80/20 Policy critical files MFA Access Control Standards Breach digital data PII Cybersecurity Landscape cookies security awareness backup information systems GDPR Vishing Procedures lockout database Networks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
accountability
information classification standards
Information Security
payment option
Phishing
Access Control Policy
data privacy
Guidelines
restricted
data security
Internal Use
SLA
Ransomware
confidential
Risk
Worm
Social Engineering
BYOD
Sensitive
SDLC
compromise
security
vulnerability
12 characters
Threat
DPA
Threat Landscape
server
Smishing
Spear Phishing
Password
lockout
Social Media Scams
data
Vulnerability
Pretexting
Phishing
Virus
Scam
Trojan
80/20
Policy
critical files
MFA
Access Control
Standards
Breach
digital data
PII
Cybersecurity Landscape
cookies
security awareness
backup
information systems
GDPR
Vishing
Procedures
lockout
database
Networks