Deepfake Digital footprint Data breach Firewall Impersonation Business email compromise (BEC) Privilege escalation Insider threat Keeper Patch update Credential stuffing Spoofed domain vishing Password manager penetration testing Social engineering shadow IT Public data Restricted country sand box removable media Vulnerability Role- based access control Incident Response Team Spyware Remediation Training attack vector Misinformation (AI) Ransomware Tailgating Brute force attack threat actor Encryption Adware Zero- day exploit Keylogger smishing Dark web spear phishing Restricted data Multi-factor authentication (MFA) Access control Acceptable Use Policy Zero Trust Malware Incident response Clean desk policy VPN (Virtual Private Network) Role- based training endpoint security Cyber hygiene Data classification Blocklisting confidential data Virus Tokenization Free! backdoor DDoS attack (Distributed Denial of Service) Phish Alert Button (PAB) Annual security training Phishing Security audit BYOD (Bring Your Own Device) Policy Violation Compliance Deepfake Digital footprint Data breach Firewall Impersonation Business email compromise (BEC) Privilege escalation Insider threat Keeper Patch update Credential stuffing Spoofed domain vishing Password manager penetration testing Social engineering shadow IT Public data Restricted country sand box removable media Vulnerability Role- based access control Incident Response Team Spyware Remediation Training attack vector Misinformation (AI) Ransomware Tailgating Brute force attack threat actor Encryption Adware Zero- day exploit Keylogger smishing Dark web spear phishing Restricted data Multi-factor authentication (MFA) Access control Acceptable Use Policy Zero Trust Malware Incident response Clean desk policy VPN (Virtual Private Network) Role- based training endpoint security Cyber hygiene Data classification Blocklisting confidential data Virus Tokenization Free! backdoor DDoS attack (Distributed Denial of Service) Phish Alert Button (PAB) Annual security training Phishing Security audit BYOD (Bring Your Own Device) Policy Violation Compliance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Deepfake
Digital footprint
Data breach
Firewall
Impersonation
Business email compromise (BEC)
Privilege escalation
Insider threat
Keeper
Patch update
Credential stuffing
Spoofed domain
vishing
Password manager
penetration testing
Social engineering
shadow IT
Public data
Restricted country
sand box
removable media
Vulnerability
Role-based access control
Incident Response Team
Spyware
Remediation Training
attack vector
Misinformation (AI)
Ransomware
Tailgating
Brute force attack
threat actor
Encryption
Adware
Zero-day exploit
Keylogger
smishing
Dark web
spear phishing
Restricted data
Multi-factor authentication (MFA)
Access control
Acceptable Use Policy
Zero Trust
Malware
Incident response
Clean desk policy
VPN (Virtual Private Network)
Role-based training
endpoint security
Cyber hygiene
Data classification
Blocklisting
confidential data
Virus
Tokenization
Free!
backdoor
DDoS attack (Distributed Denial of Service)
Phish Alert Button (PAB)
Annual security training
Phishing
Security audit
BYOD (Bring Your Own Device)
Policy Violation
Compliance