Security audit Patch update spear phishing Keylogger Credential stuffing Role- based training Phish Alert Button (PAB) BYOD (Bring Your Own Device) Free! Misinformation (AI) attack vector removable media Malware vishing shadow IT smishing Phishing Vulnerability Spoofed domain Firewall Dark web penetration testing Business email compromise (BEC) Adware Ransomware Encryption Password manager Compliance Privilege escalation Acceptable Use Policy Data classification Insider threat Brute force attack threat actor Restricted data Tokenization Public data VPN (Virtual Private Network) Incident response Zero Trust Digital footprint Restricted country Role- based access control Blocklisting DDoS attack (Distributed Denial of Service) backdoor Policy Violation Clean desk policy Annual security training endpoint security Data breach Impersonation Spyware sand box Keeper confidential data Virus Cyber hygiene Tailgating Incident Response Team Deepfake Zero- day exploit Multi-factor authentication (MFA) Access control Social engineering Remediation Training Security audit Patch update spear phishing Keylogger Credential stuffing Role- based training Phish Alert Button (PAB) BYOD (Bring Your Own Device) Free! Misinformation (AI) attack vector removable media Malware vishing shadow IT smishing Phishing Vulnerability Spoofed domain Firewall Dark web penetration testing Business email compromise (BEC) Adware Ransomware Encryption Password manager Compliance Privilege escalation Acceptable Use Policy Data classification Insider threat Brute force attack threat actor Restricted data Tokenization Public data VPN (Virtual Private Network) Incident response Zero Trust Digital footprint Restricted country Role- based access control Blocklisting DDoS attack (Distributed Denial of Service) backdoor Policy Violation Clean desk policy Annual security training endpoint security Data breach Impersonation Spyware sand box Keeper confidential data Virus Cyber hygiene Tailgating Incident Response Team Deepfake Zero- day exploit Multi-factor authentication (MFA) Access control Social engineering Remediation Training
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security audit
Patch update
spear phishing
Keylogger
Credential stuffing
Role-based training
Phish Alert Button (PAB)
BYOD (Bring Your Own Device)
Free!
Misinformation (AI)
attack vector
removable media
Malware
vishing
shadow IT
smishing
Phishing
Vulnerability
Spoofed domain
Firewall
Dark web
penetration testing
Business email compromise (BEC)
Adware
Ransomware
Encryption
Password manager
Compliance
Privilege escalation
Acceptable Use Policy
Data classification
Insider threat
Brute force attack
threat actor
Restricted data
Tokenization
Public data
VPN (Virtual Private Network)
Incident response
Zero Trust
Digital footprint
Restricted country
Role-based access control
Blocklisting
DDoS attack (Distributed Denial of Service)
backdoor
Policy Violation
Clean desk policy
Annual security training
endpoint security
Data breach
Impersonation
Spyware
sand box
Keeper
confidential data
Virus
Cyber hygiene
Tailgating
Incident Response Team
Deepfake
Zero-day exploit
Multi-factor authentication (MFA)
Access control
Social engineering
Remediation Training