Networks data lockout data privacy Application Security Worm vulnerability Threat Sensitive compromise Information Security cookies Authorization Virus Access Control Policy MFA Scam Privacy 12 characters Trojan Standards Pretexting payment gateway confidential Threat Landscape 80/20 PII Policy critical files Social Media Scams OWASP Authentication backup Access Control Procedures Internal Use restricted Ransomware security SLA Smishing Phishing SDLC Vulnerability server server Password information classification standards Audit GDPR information systems payment option Breach Vishing Spear Phishing Social Engineering Risk digital data data security BYOD Phishing database Cybersecurity Landscape security awareness DPA Guidelines accountability compliance Networks data lockout data privacy Application Security Worm vulnerability Threat Sensitive compromise Information Security cookies Authorization Virus Access Control Policy MFA Scam Privacy 12 characters Trojan Standards Pretexting payment gateway confidential Threat Landscape 80/20 PII Policy critical files Social Media Scams OWASP Authentication backup Access Control Procedures Internal Use restricted Ransomware security SLA Smishing Phishing SDLC Vulnerability server server Password information classification standards Audit GDPR information systems payment option Breach Vishing Spear Phishing Social Engineering Risk digital data data security BYOD Phishing database Cybersecurity Landscape security awareness DPA Guidelines accountability compliance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Networks
data
lockout
data privacy
Application Security
Worm
vulnerability
Threat
Sensitive
compromise
Information Security
cookies
Authorization
Virus
Access Control Policy
MFA
Scam
Privacy
12 characters
Trojan
Standards
Pretexting
payment gateway
confidential
Threat Landscape
80/20
PII
Policy
critical files
Social Media Scams
OWASP
Authentication
backup
Access Control
Procedures
Internal Use
restricted
Ransomware
security
SLA
Smishing
Phishing
SDLC
Vulnerability
server
server
Password
information classification standards
Audit
GDPR
information systems
payment option
Breach
Vishing
Spear Phishing
Social Engineering
Risk
digital data
data security
BYOD
Phishing
database
Cybersecurity Landscape
security awareness
DPA
Guidelines
accountability
compliance