data Guidelines Networks security Sensitive 80/20 Authorization Trojan compromise backup Vulnerability Ransomware Risk BYOD database Cybersecurity Landscape Access Control GDPR restricted Breach Application Security Password compliance Privacy DPA Spear Phishing Audit accountability Internal Use Procedures payment gateway SDLC confidential Social Media Scams Scam information systems vulnerability 12 characters digital data Authentication server Vishing information classification standards critical files Virus SLA Information Security Standards Phishing Smishing Worm Access Control Policy cookies OWASP data privacy Pretexting payment option security awareness server Threat Phishing PII MFA data security Policy Social Engineering lockout Threat Landscape data Guidelines Networks security Sensitive 80/20 Authorization Trojan compromise backup Vulnerability Ransomware Risk BYOD database Cybersecurity Landscape Access Control GDPR restricted Breach Application Security Password compliance Privacy DPA Spear Phishing Audit accountability Internal Use Procedures payment gateway SDLC confidential Social Media Scams Scam information systems vulnerability 12 characters digital data Authentication server Vishing information classification standards critical files Virus SLA Information Security Standards Phishing Smishing Worm Access Control Policy cookies OWASP data privacy Pretexting payment option security awareness server Threat Phishing PII MFA data security Policy Social Engineering lockout Threat Landscape
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
data
Guidelines
Networks
security
Sensitive
80/20
Authorization
Trojan
compromise
backup
Vulnerability
Ransomware
Risk
BYOD
database
Cybersecurity Landscape
Access Control
GDPR
restricted
Breach
Application Security
Password
compliance
Privacy
DPA
Spear Phishing
Audit
accountability
Internal Use
Procedures
payment gateway
SDLC
confidential
Social Media Scams
Scam
information systems
vulnerability
12 characters
digital data
Authentication
server
Vishing
information classification standards
critical files
Virus
SLA
Information Security
Standards
Phishing
Smishing
Worm
Access Control Policy
cookies
OWASP
data privacy
Pretexting
payment option
security awareness
server
Threat
Phishing
PII
MFA
data security
Policy
Social Engineering
lockout
Threat Landscape