Authentication Scam database Information Security Access Control MFA Smishing PII compliance Ransomware Vishing lockout Procedures payment gateway BYOD Pretexting server security Authorization Policy Cybersecurity Landscape 12 characters information classification standards accountability Social Media Scams OWASP Access Control Policy cookies Trojan 80/20 Sensitive data Social Engineering restricted Password DPA Breach Privacy Risk SDLC Phishing Networks data security Audit Spear Phishing payment option digital data information systems confidential server Application Security SLA data privacy Worm Vulnerability backup Internal Use GDPR Virus Standards compromise vulnerability Threat critical files Threat Landscape Phishing Guidelines security awareness Authentication Scam database Information Security Access Control MFA Smishing PII compliance Ransomware Vishing lockout Procedures payment gateway BYOD Pretexting server security Authorization Policy Cybersecurity Landscape 12 characters information classification standards accountability Social Media Scams OWASP Access Control Policy cookies Trojan 80/20 Sensitive data Social Engineering restricted Password DPA Breach Privacy Risk SDLC Phishing Networks data security Audit Spear Phishing payment option digital data information systems confidential server Application Security SLA data privacy Worm Vulnerability backup Internal Use GDPR Virus Standards compromise vulnerability Threat critical files Threat Landscape Phishing Guidelines security awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Authentication
Scam
database
Information Security
Access Control
MFA
Smishing
PII
compliance
Ransomware
Vishing
lockout
Procedures
payment gateway
BYOD
Pretexting
server
security
Authorization
Policy
Cybersecurity Landscape
12 characters
information classification standards
accountability
Social Media Scams
OWASP
Access Control Policy
cookies
Trojan
80/20
Sensitive
data
Social Engineering
restricted
Password
DPA
Breach
Privacy
Risk
SDLC
Phishing
Networks
data security
Audit
Spear Phishing
payment option
digital data
information systems
confidential
server
Application Security
SLA
data privacy
Worm
Vulnerability
backup
Internal Use
GDPR
Virus
Standards
compromise
vulnerability
Threat
critical files
Threat Landscape
Phishing
Guidelines
security awareness