Incident Response Screen lock policy Personally identifiable information (PII) Zero- day Security Policy Software updates Dark web Honeypot Malware Cyber Hygiene Threat Multi-factor authentication (MFA) Phishing Backdoor Compliance Training Penetration Testing Worm Backups APT (Advanced Persistent Threat) Scareware Spoofing Virus Compromise Whale phishing Intrusion Threat Actor Data Loss Prevention (DLP) Encryption Patch Breach Cyberattack Reusing passwords Exploit Endpoint Vulnerability Social Engineering Awareness Botnet Digital Certificate Ransomware Threat Intelligence Insider Threat Spear phishing Trojan Incident Response Screen lock policy Personally identifiable information (PII) Zero- day Security Policy Software updates Dark web Honeypot Malware Cyber Hygiene Threat Multi-factor authentication (MFA) Phishing Backdoor Compliance Training Penetration Testing Worm Backups APT (Advanced Persistent Threat) Scareware Spoofing Virus Compromise Whale phishing Intrusion Threat Actor Data Loss Prevention (DLP) Encryption Patch Breach Cyberattack Reusing passwords Exploit Endpoint Vulnerability Social Engineering Awareness Botnet Digital Certificate Ransomware Threat Intelligence Insider Threat Spear phishing Trojan
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Incident Response
Screen lock policy
Personally identifiable information (PII)
Zero-day
Security Policy
Software updates
Dark web
Honeypot
Malware
Cyber Hygiene
Threat
Multi-factor authentication (MFA)
Phishing
Backdoor
Compliance
Training
Penetration Testing
Worm
Backups
APT (Advanced Persistent Threat)
Scareware
Spoofing
Virus
Compromise
Whale phishing
Intrusion
Threat Actor
Data Loss Prevention (DLP)
Encryption
Patch
Breach
Cyberattack
Reusing passwords
Exploit
Endpoint
Vulnerability
Social Engineering
Awareness
Botnet
Digital Certificate
Ransomware
Threat Intelligence
Insider Threat
Spear phishing
Trojan