Insider Threat Training Worm Screen lock policy Dark web Incident Response Botnet Vulnerability Reusing passwords Scareware Awareness Social Engineering Zero- day Hashing Honeypot Spear phishing Phishing Backups Personally identifiable information (PII) IPS (Intrusion Prevention System) Ransomware Software updates Breach Patch Threat Threat Intelligence Trojan Encryption Data Loss Prevention (DLP) Compliance Cyberattack Sandbox Penetration Testing IDS (Intrusion Detection System) Spoofing APT (Advanced Persistent Threat) Digital Certificate Whale phishing Malware Compromise Threat Actor Backdoor Security Policy Risk Assessment Exploit Intrusion Cyber Hygiene Virus Multi-factor authentication (MFA) Endpoint Insider Threat Training Worm Screen lock policy Dark web Incident Response Botnet Vulnerability Reusing passwords Scareware Awareness Social Engineering Zero- day Hashing Honeypot Spear phishing Phishing Backups Personally identifiable information (PII) IPS (Intrusion Prevention System) Ransomware Software updates Breach Patch Threat Threat Intelligence Trojan Encryption Data Loss Prevention (DLP) Compliance Cyberattack Sandbox Penetration Testing IDS (Intrusion Detection System) Spoofing APT (Advanced Persistent Threat) Digital Certificate Whale phishing Malware Compromise Threat Actor Backdoor Security Policy Risk Assessment Exploit Intrusion Cyber Hygiene Virus Multi-factor authentication (MFA) Endpoint
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider Threat
Training
Worm
Screen lock policy
Dark web
Incident Response
Botnet
Vulnerability
Reusing passwords
Scareware
Awareness
Social Engineering
Zero-day
Hashing
Honeypot
Spear phishing
Phishing
Backups
Personally identifiable information (PII)
IPS (Intrusion Prevention System)
Ransomware
Software updates
Breach
Patch
Threat
Threat Intelligence
Trojan
Encryption
Data Loss Prevention (DLP)
Compliance
Cyberattack
Sandbox
Penetration Testing
IDS (Intrusion Detection System)
Spoofing
APT (Advanced Persistent Threat)
Digital Certificate
Whale phishing
Malware
Compromise
Threat Actor
Backdoor
Security Policy
Risk Assessment
Exploit
Intrusion
Cyber Hygiene
Virus
Multi-factor authentication (MFA)
Endpoint