Adware sand box Data breach Incident response Acceptable Use Policy Public data Keylogger Virus attack vector threat actor Multi-factor authentication (MFA) Password manager Social engineering Compliance Policy Violation Incident Response Team Restricted country Annual security training Zero- day exploit confidential data Deepfake DDoS attack (Distributed Denial of Service) Tailgating shadow IT Dark web Role- based access control Cyber hygiene Patch update Tokenization endpoint security Phishing VPN (Virtual Private Network) Ransomware Free! Impersonation BYOD (Bring Your Own Device) Phish Alert Button (PAB) penetration testing Restricted data Spyware Zero Trust vishing Keeper Business email compromise (BEC) Insider threat Vulnerability smishing Firewall Credential stuffing removable media Privilege escalation Brute force attack Security audit Clean desk policy backdoor Encryption Access control Misinformation (AI) Blocklisting spear phishing Remediation Training Digital footprint Malware Data classification Spoofed domain Role- based training Adware sand box Data breach Incident response Acceptable Use Policy Public data Keylogger Virus attack vector threat actor Multi-factor authentication (MFA) Password manager Social engineering Compliance Policy Violation Incident Response Team Restricted country Annual security training Zero- day exploit confidential data Deepfake DDoS attack (Distributed Denial of Service) Tailgating shadow IT Dark web Role- based access control Cyber hygiene Patch update Tokenization endpoint security Phishing VPN (Virtual Private Network) Ransomware Free! Impersonation BYOD (Bring Your Own Device) Phish Alert Button (PAB) penetration testing Restricted data Spyware Zero Trust vishing Keeper Business email compromise (BEC) Insider threat Vulnerability smishing Firewall Credential stuffing removable media Privilege escalation Brute force attack Security audit Clean desk policy backdoor Encryption Access control Misinformation (AI) Blocklisting spear phishing Remediation Training Digital footprint Malware Data classification Spoofed domain Role- based training
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Adware
sand box
Data breach
Incident response
Acceptable Use Policy
Public data
Keylogger
Virus
attack vector
threat actor
Multi-factor authentication (MFA)
Password manager
Social engineering
Compliance
Policy Violation
Incident Response Team
Restricted country
Annual security training
Zero-day exploit
confidential data
Deepfake
DDoS attack (Distributed Denial of Service)
Tailgating
shadow IT
Dark web
Role-based access control
Cyber hygiene
Patch update
Tokenization
endpoint security
Phishing
VPN (Virtual Private Network)
Ransomware
Free!
Impersonation
BYOD (Bring Your Own Device)
Phish Alert Button (PAB)
penetration testing
Restricted data
Spyware
Zero Trust
vishing
Keeper
Business email compromise (BEC)
Insider threat
Vulnerability
smishing
Firewall
Credential stuffing
removable media
Privilege escalation
Brute force attack
Security audit
Clean desk policy
backdoor
Encryption
Access control
Misinformation (AI)
Blocklisting
spear phishing
Remediation Training
Digital footprint
Malware
Data classification
Spoofed domain
Role-based training