DDoS attack (Distributed Denial of Service) Data classification endpoint security Encryption Misinformation (AI) Digital footprint spear phishing threat actor Remediation Training Free! Blocklisting Social engineering Patch update shadow IT Incident response sand box Cyber hygiene Annual security training removable media VPN (Virtual Private Network) Privilege escalation backdoor Spoofed domain Compliance Acceptable Use Policy Phish Alert Button (PAB) vishing Phishing Business email compromise (BEC) Firewall attack vector Brute force attack Access control Role- based access control Credential stuffing Tokenization Incident Response Team Zero- day exploit Keylogger Ransomware Impersonation Restricted data Security audit Deepfake confidential data Restricted country Vulnerability Insider threat Policy Violation Clean desk policy Multi-factor authentication (MFA) Public data Malware Virus Role- based training Zero Trust Adware BYOD (Bring Your Own Device) smishing Password manager penetration testing Keeper Tailgating Spyware Dark web Data breach DDoS attack (Distributed Denial of Service) Data classification endpoint security Encryption Misinformation (AI) Digital footprint spear phishing threat actor Remediation Training Free! Blocklisting Social engineering Patch update shadow IT Incident response sand box Cyber hygiene Annual security training removable media VPN (Virtual Private Network) Privilege escalation backdoor Spoofed domain Compliance Acceptable Use Policy Phish Alert Button (PAB) vishing Phishing Business email compromise (BEC) Firewall attack vector Brute force attack Access control Role- based access control Credential stuffing Tokenization Incident Response Team Zero- day exploit Keylogger Ransomware Impersonation Restricted data Security audit Deepfake confidential data Restricted country Vulnerability Insider threat Policy Violation Clean desk policy Multi-factor authentication (MFA) Public data Malware Virus Role- based training Zero Trust Adware BYOD (Bring Your Own Device) smishing Password manager penetration testing Keeper Tailgating Spyware Dark web Data breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DDoS attack (Distributed Denial of Service)
Data classification
endpoint security
Encryption
Misinformation (AI)
Digital footprint
spear phishing
threat actor
Remediation Training
Free!
Blocklisting
Social engineering
Patch update
shadow IT
Incident response
sand box
Cyber hygiene
Annual security training
removable media
VPN (Virtual Private Network)
Privilege escalation
backdoor
Spoofed domain
Compliance
Acceptable Use Policy
Phish Alert Button (PAB)
vishing
Phishing
Business email compromise (BEC)
Firewall
attack vector
Brute force attack
Access control
Role-based access control
Credential stuffing
Tokenization
Incident Response Team
Zero-day exploit
Keylogger
Ransomware
Impersonation
Restricted data
Security audit
Deepfake
confidential data
Restricted country
Vulnerability
Insider threat
Policy Violation
Clean desk policy
Multi-factor authentication (MFA)
Public data
Malware
Virus
Role-based training
Zero Trust
Adware
BYOD (Bring Your Own Device)
smishing
Password manager
penetration testing
Keeper
Tailgating
Spyware
Dark web
Data breach