DDoS attack (Distributed Denial of Service) Restricted country Keylogger Password manager Zero Trust Public data Social engineering Credential stuffing Firewall Tokenization Role- based training Role- based access control Malware smishing Security audit Remediation Training Virus Compliance confidential data Keeper Policy Violation Restricted data Incident response Phish Alert Button (PAB) Insider threat attack vector Tailgating Cyber hygiene Ransomware threat actor penetration testing Dark web Phishing sand box spear phishing Data breach Data classification Adware endpoint security Multi-factor authentication (MFA) Blocklisting Access control Zero- day exploit Privilege escalation Incident Response Team Patch update vishing Spoofed domain VPN (Virtual Private Network) Vulnerability Misinformation (AI) Digital footprint BYOD (Bring Your Own Device) Clean desk policy Business email compromise (BEC) Free! Deepfake Encryption Acceptable Use Policy Impersonation Spyware Annual security training shadow IT removable media Brute force attack backdoor DDoS attack (Distributed Denial of Service) Restricted country Keylogger Password manager Zero Trust Public data Social engineering Credential stuffing Firewall Tokenization Role- based training Role- based access control Malware smishing Security audit Remediation Training Virus Compliance confidential data Keeper Policy Violation Restricted data Incident response Phish Alert Button (PAB) Insider threat attack vector Tailgating Cyber hygiene Ransomware threat actor penetration testing Dark web Phishing sand box spear phishing Data breach Data classification Adware endpoint security Multi-factor authentication (MFA) Blocklisting Access control Zero- day exploit Privilege escalation Incident Response Team Patch update vishing Spoofed domain VPN (Virtual Private Network) Vulnerability Misinformation (AI) Digital footprint BYOD (Bring Your Own Device) Clean desk policy Business email compromise (BEC) Free! Deepfake Encryption Acceptable Use Policy Impersonation Spyware Annual security training shadow IT removable media Brute force attack backdoor
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DDoS attack (Distributed Denial of Service)
Restricted country
Keylogger
Password manager
Zero Trust
Public data
Social engineering
Credential stuffing
Firewall
Tokenization
Role-based training
Role-based access control
Malware
smishing
Security audit
Remediation Training
Virus
Compliance
confidential data
Keeper
Policy Violation
Restricted data
Incident response
Phish Alert Button (PAB)
Insider threat
attack vector
Tailgating
Cyber hygiene
Ransomware
threat actor
penetration testing
Dark web
Phishing
sand box
spear phishing
Data breach
Data classification
Adware
endpoint security
Multi-factor authentication (MFA)
Blocklisting
Access control
Zero-day exploit
Privilege escalation
Incident Response Team
Patch update
vishing
Spoofed domain
VPN (Virtual Private Network)
Vulnerability
Misinformation (AI)
Digital footprint
BYOD (Bring Your Own Device)
Clean desk policy
Business email compromise (BEC)
Free!
Deepfake
Encryption
Acceptable Use Policy
Impersonation
Spyware
Annual security training
shadow IT
removable media
Brute force attack
backdoor