Incident Response (IR) Public Key Infrastructure (PKI) Virtual Private Network (VPN) Data Loss Prevention (DLP) Endpoint Security Denial of Service (DoS) Attack Two-Factor Authentication (2FA) Social Engineering Botnet Threat Antivirus Vulnerability Cryptography Cyber Threat Intelligence (CTI) Firewall Zero- Day Exploit Malware Data Breach Phishing Intrusion Detection System (IDS) Encryption Patch Access Control Ransomware Penetration Testing Incident Response (IR) Public Key Infrastructure (PKI) Virtual Private Network (VPN) Data Loss Prevention (DLP) Endpoint Security Denial of Service (DoS) Attack Two-Factor Authentication (2FA) Social Engineering Botnet Threat Antivirus Vulnerability Cryptography Cyber Threat Intelligence (CTI) Firewall Zero- Day Exploit Malware Data Breach Phishing Intrusion Detection System (IDS) Encryption Patch Access Control Ransomware Penetration Testing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Incident Response (IR)
Public Key Infrastructure (PKI)
Virtual Private Network (VPN)
Data Loss Prevention (DLP)
Endpoint Security
Denial of Service (DoS) Attack
Two-Factor Authentication (2FA)
Social Engineering
Botnet
Threat
Antivirus
Vulnerability
Cryptography
Cyber Threat Intelligence (CTI)
Firewall
Zero-Day Exploit
Malware
Data Breach
Phishing
Intrusion Detection System (IDS)
Encryption
Patch
Access Control
Ransomware
Penetration Testing