Brute force attack Role- based training Acceptable Use Policy Vulnerability Malware Compliance Zero Trust spear phishing Incident Response Team Remediation Training threat actor Tokenization Public data Virus Multi-factor authentication (MFA) Impersonation Password manager Privilege escalation Misinformation (AI) Restricted data Clean desk policy Encryption Policy Violation VPN (Virtual Private Network) Business email compromise (BEC) DDoS attack (Distributed Denial of Service) Deepfake confidential data Data classification smishing attack vector Adware Digital footprint Keylogger Restricted country Patch update endpoint security removable media penetration testing Tailgating Keeper shadow IT Cyber hygiene Role- based access control Dark web Credential stuffing Ransomware Firewall Insider threat Social engineering Data breach Phish Alert Button (PAB) Incident response Phishing Free! Security audit backdoor Annual security training Access control vishing sand box BYOD (Bring Your Own Device) Blocklisting Zero- day exploit Spoofed domain Spyware Brute force attack Role- based training Acceptable Use Policy Vulnerability Malware Compliance Zero Trust spear phishing Incident Response Team Remediation Training threat actor Tokenization Public data Virus Multi-factor authentication (MFA) Impersonation Password manager Privilege escalation Misinformation (AI) Restricted data Clean desk policy Encryption Policy Violation VPN (Virtual Private Network) Business email compromise (BEC) DDoS attack (Distributed Denial of Service) Deepfake confidential data Data classification smishing attack vector Adware Digital footprint Keylogger Restricted country Patch update endpoint security removable media penetration testing Tailgating Keeper shadow IT Cyber hygiene Role- based access control Dark web Credential stuffing Ransomware Firewall Insider threat Social engineering Data breach Phish Alert Button (PAB) Incident response Phishing Free! Security audit backdoor Annual security training Access control vishing sand box BYOD (Bring Your Own Device) Blocklisting Zero- day exploit Spoofed domain Spyware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Brute force attack
Role-based training
Acceptable Use Policy
Vulnerability
Malware
Compliance
Zero Trust
spear phishing
Incident Response Team
Remediation Training
threat actor
Tokenization
Public data
Virus
Multi-factor authentication (MFA)
Impersonation
Password manager
Privilege escalation
Misinformation (AI)
Restricted data
Clean desk policy
Encryption
Policy Violation
VPN (Virtual Private Network)
Business email compromise (BEC)
DDoS attack (Distributed Denial of Service)
Deepfake
confidential data
Data classification
smishing
attack vector
Adware
Digital footprint
Keylogger
Restricted country
Patch update
endpoint security
removable media
penetration testing
Tailgating
Keeper
shadow IT
Cyber hygiene
Role-based access control
Dark web
Credential stuffing
Ransomware
Firewall
Insider threat
Social engineering
Data breach
Phish Alert Button (PAB)
Incident response
Phishing
Free!
Security audit
backdoor
Annual security training
Access control
vishing
sand box
BYOD (Bring Your Own Device)
Blocklisting
Zero-day exploit
Spoofed domain
Spyware