Personally identifiable information (PII) Training Virus Compliance Awareness Insider Threat Ransomware Penetration Testing Multi-factor authentication (MFA) Exploit Threat Compromise Scareware Honeypot Phishing Software updates Threat Intelligence Backups Zero- day Breach Patch Spear phishing Hashing Security Policy Cyberattack Backdoor Intrusion Reusing passwords Sandbox Screen lock policy Dark web Incident Response Vulnerability Data Loss Prevention (DLP) Digital Certificate Cyber Hygiene Trojan Spoofing Social Engineering Risk Assessment IDS (Intrusion Detection System) Worm Malware Encryption Endpoint Threat Actor APT (Advanced Persistent Threat) Whale phishing Botnet IPS (Intrusion Prevention System) Personally identifiable information (PII) Training Virus Compliance Awareness Insider Threat Ransomware Penetration Testing Multi-factor authentication (MFA) Exploit Threat Compromise Scareware Honeypot Phishing Software updates Threat Intelligence Backups Zero- day Breach Patch Spear phishing Hashing Security Policy Cyberattack Backdoor Intrusion Reusing passwords Sandbox Screen lock policy Dark web Incident Response Vulnerability Data Loss Prevention (DLP) Digital Certificate Cyber Hygiene Trojan Spoofing Social Engineering Risk Assessment IDS (Intrusion Detection System) Worm Malware Encryption Endpoint Threat Actor APT (Advanced Persistent Threat) Whale phishing Botnet IPS (Intrusion Prevention System)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Personally identifiable information (PII)
Training
Virus
Compliance
Awareness
Insider Threat
Ransomware
Penetration Testing
Multi-factor authentication (MFA)
Exploit
Threat
Compromise
Scareware
Honeypot
Phishing
Software updates
Threat Intelligence
Backups
Zero-day
Breach
Patch
Spear phishing
Hashing
Security Policy
Cyberattack
Backdoor
Intrusion
Reusing passwords
Sandbox
Screen lock policy
Dark web
Incident Response
Vulnerability
Data Loss Prevention (DLP)
Digital Certificate
Cyber Hygiene
Trojan
Spoofing
Social Engineering
Risk Assessment
IDS (Intrusion Detection System)
Worm
Malware
Encryption
Endpoint
Threat Actor
APT (Advanced Persistent Threat)
Whale phishing
Botnet
IPS (Intrusion Prevention System)