Vulnerability Threat Landscape Password database Virus Vishing MFA digital data restricted Phishing Sensitive SLA security server compromise critical files Trojan accountability Social Engineering Threat lockout BYOD Worm Ransomware Pretexting backup Spear Phishing lockout GDPR Policy 12 characters 80/20 data privacy confidential Access Control Procedures data security Information Security information classification standards cookies Internal Use DPA Social Media Scams Guidelines Access Control Policy PII Risk Networks vulnerability Phishing SDLC Smishing payment option Breach security awareness Scam Standards information systems data Cybersecurity Landscape Vulnerability Threat Landscape Password database Virus Vishing MFA digital data restricted Phishing Sensitive SLA security server compromise critical files Trojan accountability Social Engineering Threat lockout BYOD Worm Ransomware Pretexting backup Spear Phishing lockout GDPR Policy 12 characters 80/20 data privacy confidential Access Control Procedures data security Information Security information classification standards cookies Internal Use DPA Social Media Scams Guidelines Access Control Policy PII Risk Networks vulnerability Phishing SDLC Smishing payment option Breach security awareness Scam Standards information systems data Cybersecurity Landscape
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vulnerability
Threat Landscape
Password
database
Virus
Vishing
MFA
digital data
restricted
Phishing
Sensitive
SLA
security
server
compromise
critical files
Trojan
accountability
Social Engineering
Threat
lockout
BYOD
Worm
Ransomware
Pretexting
backup
Spear Phishing
lockout
GDPR
Policy
12 characters
80/20
data privacy
confidential
Access Control
Procedures
data security
Information Security
information classification standards
cookies
Internal Use
DPA
Social Media Scams
Guidelines
Access Control Policy
PII
Risk
Networks
vulnerability
Phishing
SDLC
Smishing
payment option
Breach
security awareness
Scam
Standards
information systems
data
Cybersecurity Landscape