digital data compliance restricted 80/20 data privacy PII DPA payment gateway Threat Landscape Sensitive lockout Access Control Policy Scam Standards Threat Vishing SDLC vulnerability Ransomware server Spear Phishing Social Media Scams Privacy Phishing accountability Authentication Password Policy cookies 12 characters GDPR Virus BYOD Phishing Access Control information systems Authorization Pretexting Trojan Application Security Guidelines Information Security SLA confidential database compromise Audit server Procedures critical files Smishing Internal Use Social Engineering security awareness data Cybersecurity Landscape Breach OWASP Worm payment option MFA data security Risk Networks backup Vulnerability security information classification standards digital data compliance restricted 80/20 data privacy PII DPA payment gateway Threat Landscape Sensitive lockout Access Control Policy Scam Standards Threat Vishing SDLC vulnerability Ransomware server Spear Phishing Social Media Scams Privacy Phishing accountability Authentication Password Policy cookies 12 characters GDPR Virus BYOD Phishing Access Control information systems Authorization Pretexting Trojan Application Security Guidelines Information Security SLA confidential database compromise Audit server Procedures critical files Smishing Internal Use Social Engineering security awareness data Cybersecurity Landscape Breach OWASP Worm payment option MFA data security Risk Networks backup Vulnerability security information classification standards
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
digital data
compliance
restricted
80/20
data privacy
PII
DPA
payment gateway
Threat Landscape
Sensitive
lockout
Access Control Policy
Scam
Standards
Threat
Vishing
SDLC
vulnerability
Ransomware
server
Spear Phishing
Social Media Scams
Privacy
Phishing
accountability
Authentication
Password
Policy
cookies
12 characters
GDPR
Virus
BYOD
Phishing
Access Control
information systems
Authorization
Pretexting
Trojan
Application Security
Guidelines
Information Security
SLA
confidential
database
compromise
Audit
server
Procedures
critical files
Smishing
Internal Use
Social Engineering
security awareness
data
Cybersecurity Landscape
Breach
OWASP
Worm
payment option
MFA
data security
Risk
Networks
backup
Vulnerability
security
information classification standards