Whale phishing APT (Advanced Persistent Threat) Compliance Hashing Spear phishing Zero- day Personally identifiable information (PII) Reusing passwords Ransomware Vulnerability Penetration Testing Incident Response Endpoint Backups Risk Assessment Threat Threat Actor Intrusion Compromise IPS (Intrusion Prevention System) Worm Screen lock policy Honeypot Awareness Backdoor IDS (Intrusion Detection System) Software updates Sandbox Botnet Multi-factor authentication (MFA) Digital Certificate Data Loss Prevention (DLP) Patch Malware Social Engineering Security Policy Training Virus Scareware Trojan Cyber Hygiene Insider Threat Spoofing Phishing Cyberattack Dark web Breach Encryption Threat Intelligence Exploit Whale phishing APT (Advanced Persistent Threat) Compliance Hashing Spear phishing Zero- day Personally identifiable information (PII) Reusing passwords Ransomware Vulnerability Penetration Testing Incident Response Endpoint Backups Risk Assessment Threat Threat Actor Intrusion Compromise IPS (Intrusion Prevention System) Worm Screen lock policy Honeypot Awareness Backdoor IDS (Intrusion Detection System) Software updates Sandbox Botnet Multi-factor authentication (MFA) Digital Certificate Data Loss Prevention (DLP) Patch Malware Social Engineering Security Policy Training Virus Scareware Trojan Cyber Hygiene Insider Threat Spoofing Phishing Cyberattack Dark web Breach Encryption Threat Intelligence Exploit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Whale phishing
APT (Advanced Persistent Threat)
Compliance
Hashing
Spear phishing
Zero-day
Personally identifiable information (PII)
Reusing passwords
Ransomware
Vulnerability
Penetration Testing
Incident Response
Endpoint
Backups
Risk Assessment
Threat
Threat Actor
Intrusion
Compromise
IPS (Intrusion Prevention System)
Worm
Screen lock policy
Honeypot
Awareness
Backdoor
IDS (Intrusion Detection System)
Software updates
Sandbox
Botnet
Multi-factor authentication (MFA)
Digital Certificate
Data Loss Prevention (DLP)
Patch
Malware
Social Engineering
Security Policy
Training
Virus
Scareware
Trojan
Cyber Hygiene
Insider Threat
Spoofing
Phishing
Cyberattack
Dark web
Breach
Encryption
Threat Intelligence
Exploit