database Breach restricted Access Control GDPR Procedures Sensitive information systems Vulnerability Phishing MFA 80/20 security cookies data security backup information classification standards lockout Spear Phishing Password Social Engineering accountability Networks digital data data payment option Information Security lockout Ransomware Guidelines Worm Access Control Policy Policy Phishing confidential SDLC Threat Landscape critical files Smishing 12 characters Internal Use vulnerability data privacy Scam Threat Cybersecurity Landscape BYOD security awareness PII compromise DPA Vishing Virus SLA Standards Trojan Risk Social Media Scams server Pretexting database Breach restricted Access Control GDPR Procedures Sensitive information systems Vulnerability Phishing MFA 80/20 security cookies data security backup information classification standards lockout Spear Phishing Password Social Engineering accountability Networks digital data data payment option Information Security lockout Ransomware Guidelines Worm Access Control Policy Policy Phishing confidential SDLC Threat Landscape critical files Smishing 12 characters Internal Use vulnerability data privacy Scam Threat Cybersecurity Landscape BYOD security awareness PII compromise DPA Vishing Virus SLA Standards Trojan Risk Social Media Scams server Pretexting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
database
Breach
restricted
Access Control
GDPR
Procedures
Sensitive
information systems
Vulnerability
Phishing
MFA
80/20
security
cookies
data security
backup
information classification standards
lockout
Spear Phishing
Password
Social Engineering
accountability
Networks
digital data
data
payment option
Information Security
lockout
Ransomware
Guidelines
Worm
Access Control Policy
Policy
Phishing
confidential
SDLC
Threat Landscape
critical files
Smishing
12 characters
Internal Use
vulnerability
data privacy
Scam
Threat
Cybersecurity Landscape
BYOD
security awareness
PII
compromise
DPA
Vishing
Virus
SLA
Standards
Trojan
Risk
Social Media Scams
server
Pretexting