Privacy security lockout confidential Cybersecurity Landscape Worm Pretexting digital data DPA MFA Application Security PII Threat information classification standards Audit backup Risk Procedures SDLC Phishing Breach server security awareness compliance Smishing Authentication Virus data privacy Authorization information systems Guidelines Access Control Policy GDPR Standards Scam cookies Vulnerability Vishing Policy Phishing Social Engineering Social Media Scams restricted Threat Landscape accountability SLA OWASP Access Control Password 12 characters compromise payment gateway Internal Use vulnerability database Networks Information Security BYOD payment option Spear Phishing critical files data security data Trojan Ransomware server 80/20 Sensitive Privacy security lockout confidential Cybersecurity Landscape Worm Pretexting digital data DPA MFA Application Security PII Threat information classification standards Audit backup Risk Procedures SDLC Phishing Breach server security awareness compliance Smishing Authentication Virus data privacy Authorization information systems Guidelines Access Control Policy GDPR Standards Scam cookies Vulnerability Vishing Policy Phishing Social Engineering Social Media Scams restricted Threat Landscape accountability SLA OWASP Access Control Password 12 characters compromise payment gateway Internal Use vulnerability database Networks Information Security BYOD payment option Spear Phishing critical files data security data Trojan Ransomware server 80/20 Sensitive
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Privacy
security
lockout
confidential
Cybersecurity Landscape
Worm
Pretexting
digital data
DPA
MFA
Application Security
PII
Threat
information classification standards
Audit
backup
Risk
Procedures
SDLC
Phishing
Breach
server
security awareness
compliance
Smishing
Authentication
Virus
data privacy
Authorization
information systems
Guidelines
Access Control Policy
GDPR
Standards
Scam
cookies
Vulnerability
Vishing
Policy
Phishing
Social Engineering
Social Media Scams
restricted
Threat Landscape
accountability
SLA
OWASP
Access Control
Password
12 characters
compromise
payment gateway
Internal Use
vulnerability
database
Networks
Information Security
BYOD
payment option
Spear Phishing
critical files
data security
data
Trojan
Ransomware
server
80/20
Sensitive