Access Control Sensitive data security payment option server Access Control Policy SDLC Breach Social Engineering vulnerability Threat server Password Risk Smishing restricted Phishing Networks payment gateway data BYOD Standards Spear Phishing database cookies Vishing Trojan compliance Audit Worm Vulnerability DPA Ransomware Virus information systems Privacy SLA Authorization Guidelines Application Security Threat Landscape 12 characters security Procedures Scam Phishing Pretexting Cybersecurity Landscape PII Policy MFA Social Media Scams information classification standards backup lockout 80/20 Authentication Information Security Internal Use data privacy accountability OWASP confidential critical files compromise GDPR security awareness digital data Access Control Sensitive data security payment option server Access Control Policy SDLC Breach Social Engineering vulnerability Threat server Password Risk Smishing restricted Phishing Networks payment gateway data BYOD Standards Spear Phishing database cookies Vishing Trojan compliance Audit Worm Vulnerability DPA Ransomware Virus information systems Privacy SLA Authorization Guidelines Application Security Threat Landscape 12 characters security Procedures Scam Phishing Pretexting Cybersecurity Landscape PII Policy MFA Social Media Scams information classification standards backup lockout 80/20 Authentication Information Security Internal Use data privacy accountability OWASP confidential critical files compromise GDPR security awareness digital data
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Access Control
Sensitive
data security
payment option
server
Access Control Policy
SDLC
Breach
Social Engineering
vulnerability
Threat
server
Password
Risk
Smishing
restricted
Phishing
Networks
payment gateway
data
BYOD
Standards
Spear Phishing
database
cookies
Vishing
Trojan
compliance
Audit
Worm
Vulnerability
DPA
Ransomware
Virus
information systems
Privacy
SLA
Authorization
Guidelines
Application Security
Threat Landscape
12 characters
security
Procedures
Scam
Phishing
Pretexting
Cybersecurity Landscape
PII
Policy
MFA
Social Media Scams
information classification standards
backup
lockout
80/20
Authentication
Information Security
Internal Use
data privacy
accountability
OWASP
confidential
critical files
compromise
GDPR
security awareness
digital data