Information Security security awareness Social Engineering security server Threat compliance accountability Worm Cybersecurity Landscape 80/20 database OWASP lockout data security backup PII Risk GDPR Guidelines Spear Phishing SLA Access Control Policy 12 characters Audit Pretexting MFA Phishing DPA payment gateway Access Control Trojan digital data vulnerability Application Security Sensitive BYOD information classification standards Networks Standards information systems Internal Use Procedures Smishing Threat Landscape critical files Authorization data data privacy Phishing payment option Policy compromise Breach Privacy Social Media Scams Vulnerability Ransomware Password Vishing Scam confidential server cookies Authentication SDLC Virus restricted Information Security security awareness Social Engineering security server Threat compliance accountability Worm Cybersecurity Landscape 80/20 database OWASP lockout data security backup PII Risk GDPR Guidelines Spear Phishing SLA Access Control Policy 12 characters Audit Pretexting MFA Phishing DPA payment gateway Access Control Trojan digital data vulnerability Application Security Sensitive BYOD information classification standards Networks Standards information systems Internal Use Procedures Smishing Threat Landscape critical files Authorization data data privacy Phishing payment option Policy compromise Breach Privacy Social Media Scams Vulnerability Ransomware Password Vishing Scam confidential server cookies Authentication SDLC Virus restricted
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Information Security
security awareness
Social Engineering
security
server
Threat
compliance
accountability
Worm
Cybersecurity Landscape
80/20
database
OWASP
lockout
data security
backup
PII
Risk
GDPR
Guidelines
Spear Phishing
SLA
Access Control Policy
12 characters
Audit
Pretexting
MFA
Phishing
DPA
payment gateway
Access Control
Trojan
digital data
vulnerability
Application Security
Sensitive
BYOD
information classification standards
Networks
Standards
information systems
Internal Use
Procedures
Smishing
Threat Landscape
critical files
Authorization
data
data privacy
Phishing
payment option
Policy
compromise
Breach
Privacy
Social Media Scams
Vulnerability
Ransomware
Password
Vishing
Scam
confidential
server
cookies
Authentication
SDLC
Virus
restricted