Patch Security breach IT Security Program Cyber intelligence Digital Certificate Encryption Crowdstrike Cybersecurity awareness Rootkit Exploit VPN Data Privacy Zero- day exploit Cyberbullying Security posture Ransomware Virus Cybersecurity insurance Firewall Man-in- the- middle attack Password Network monitoring Identity theft Backdoor Trojan Phishing Incident response PII Vulnerability Keylogger Hacker Denial of Service (DOS) MFA Penetration testing 2FA Spam Patch Security breach IT Security Program Cyber intelligence Digital Certificate Encryption Crowdstrike Cybersecurity awareness Rootkit Exploit VPN Data Privacy Zero- day exploit Cyberbullying Security posture Ransomware Virus Cybersecurity insurance Firewall Man-in- the- middle attack Password Network monitoring Identity theft Backdoor Trojan Phishing Incident response PII Vulnerability Keylogger Hacker Denial of Service (DOS) MFA Penetration testing 2FA Spam
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Patch
Security breach
IT Security Program
Cyber intelligence
Digital Certificate
Encryption
Crowdstrike
Cybersecurity awareness
Rootkit
Exploit
VPN
Data Privacy
Zero-day exploit
Cyberbullying
Security posture
Ransomware
Virus
Cybersecurity insurance
Firewall
Man-in-the-middle attack
Password
Network monitoring
Identity theft
Backdoor
Trojan
Phishing
Incident response
PII
Vulnerability
Keylogger
Hacker
Denial of Service (DOS)
MFA
Penetration testing
2FA
Spam