Social Engineering OWASP backup Access Control database 80/20 Cybersecurity Landscape SLA Privacy digital data Password Trojan payment option Worm Phishing Access Control Policy server Audit Authentication BYOD critical files cookies security Procedures compromise Pretexting data lockout 12 characters confidential vulnerability Standards payment gateway security awareness information classification standards Threat DPA Ransomware Guidelines Virus Vulnerability Information Security Vishing GDPR data privacy Threat Landscape Application Security Spear Phishing Risk information systems Networks Breach compliance data security Authorization Sensitive Phishing MFA Policy Internal Use restricted Social Media Scams accountability server Smishing SDLC PII Scam Social Engineering OWASP backup Access Control database 80/20 Cybersecurity Landscape SLA Privacy digital data Password Trojan payment option Worm Phishing Access Control Policy server Audit Authentication BYOD critical files cookies security Procedures compromise Pretexting data lockout 12 characters confidential vulnerability Standards payment gateway security awareness information classification standards Threat DPA Ransomware Guidelines Virus Vulnerability Information Security Vishing GDPR data privacy Threat Landscape Application Security Spear Phishing Risk information systems Networks Breach compliance data security Authorization Sensitive Phishing MFA Policy Internal Use restricted Social Media Scams accountability server Smishing SDLC PII Scam
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social Engineering
OWASP
backup
Access Control
database
80/20
Cybersecurity Landscape
SLA
Privacy
digital data
Password
Trojan
payment option
Worm
Phishing
Access Control Policy
server
Audit
Authentication
BYOD
critical files
cookies
security
Procedures
compromise
Pretexting
data
lockout
12 characters
confidential
vulnerability
Standards
payment gateway
security awareness
information classification standards
Threat
DPA
Ransomware
Guidelines
Virus
Vulnerability
Information Security
Vishing
GDPR
data privacy
Threat Landscape
Application Security
Spear Phishing
Risk
information systems
Networks
Breach
compliance
data security
Authorization
Sensitive
Phishing
MFA
Policy
Internal Use
restricted
Social Media Scams
accountability
server
Smishing
SDLC
PII
Scam