Exploit Malware Threat Actor Breach Insider Threat Compliance Dark web Software updates Endpoint Spear phishing Whale phishing Awareness Ransomware Threat Intelligence Compromise Cyberattack Botnet Data Loss Prevention (DLP) Social Engineering Backups Penetration Testing Security Policy Training Honeypot Threat Trojan Backdoor APT (Advanced Persistent Threat) Cyber Hygiene Personally identifiable information (PII) Vulnerability Multi-factor authentication (MFA) Reusing passwords Incident Response Screen lock policy Intrusion Digital Certificate Encryption Zero- day Patch Worm Virus Phishing Spoofing Scareware Exploit Malware Threat Actor Breach Insider Threat Compliance Dark web Software updates Endpoint Spear phishing Whale phishing Awareness Ransomware Threat Intelligence Compromise Cyberattack Botnet Data Loss Prevention (DLP) Social Engineering Backups Penetration Testing Security Policy Training Honeypot Threat Trojan Backdoor APT (Advanced Persistent Threat) Cyber Hygiene Personally identifiable information (PII) Vulnerability Multi-factor authentication (MFA) Reusing passwords Incident Response Screen lock policy Intrusion Digital Certificate Encryption Zero- day Patch Worm Virus Phishing Spoofing Scareware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Exploit
Malware
Threat Actor
Breach
Insider Threat
Compliance
Dark web
Software updates
Endpoint
Spear phishing
Whale phishing
Awareness
Ransomware
Threat Intelligence
Compromise
Cyberattack
Botnet
Data Loss Prevention (DLP)
Social Engineering
Backups
Penetration Testing
Security Policy
Training
Honeypot
Threat
Trojan
Backdoor
APT (Advanced Persistent Threat)
Cyber Hygiene
Personally identifiable information (PII)
Vulnerability
Multi-factor authentication (MFA)
Reusing passwords
Incident Response
Screen lock policy
Intrusion
Digital Certificate
Encryption
Zero-day
Patch
Worm
Virus
Phishing
Spoofing
Scareware