Smishing Authentication payment gateway Social Media Scams SLA Cybersecurity Landscape Application Security Audit Ransomware Access Control security Worm compliance Privacy Social Engineering Password Standards Authorization GDPR Vulnerability Virus Risk lockout Trojan server data critical files Pretexting security awareness Procedures vulnerability DPA Policy Breach digital data backup BYOD Threat Landscape Phishing confidential payment option restricted Access Control Policy Vishing Spear Phishing server data privacy Guidelines information systems 80/20 Scam SDLC Sensitive information classification standards PII compromise Information Security 12 characters OWASP cookies Threat Internal Use Networks data security accountability MFA Phishing database Smishing Authentication payment gateway Social Media Scams SLA Cybersecurity Landscape Application Security Audit Ransomware Access Control security Worm compliance Privacy Social Engineering Password Standards Authorization GDPR Vulnerability Virus Risk lockout Trojan server data critical files Pretexting security awareness Procedures vulnerability DPA Policy Breach digital data backup BYOD Threat Landscape Phishing confidential payment option restricted Access Control Policy Vishing Spear Phishing server data privacy Guidelines information systems 80/20 Scam SDLC Sensitive information classification standards PII compromise Information Security 12 characters OWASP cookies Threat Internal Use Networks data security accountability MFA Phishing database
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Smishing
Authentication
payment gateway
Social Media Scams
SLA
Cybersecurity Landscape
Application Security
Audit
Ransomware
Access Control
security
Worm
compliance
Privacy
Social Engineering
Password
Standards
Authorization
GDPR
Vulnerability
Virus
Risk
lockout
Trojan
server
data
critical files
Pretexting
security awareness
Procedures
vulnerability
DPA
Policy
Breach
digital data
backup
BYOD
Threat Landscape
Phishing
confidential
payment option
restricted
Access Control Policy
Vishing
Spear Phishing
server
data privacy
Guidelines
information systems
80/20
Scam
SDLC
Sensitive
information classification standards
PII
compromise
Information Security
12 characters
OWASP
cookies
Threat
Internal Use
Networks
data security
accountability
MFA
Phishing
database