Training Scareware Personally identifiable information (PII) Zero- day Screen lock policy Exploit Data Loss Prevention (DLP) Breach Worm Hashing Phishing Dark web Awareness Threat Intelligence Vulnerability Patch Botnet Trojan Compromise Whale phishing Malware Spoofing Backups Reusing passwords Multi-factor authentication (MFA) Backdoor Endpoint APT (Advanced Persistent Threat) Software updates Digital Certificate Social Engineering Incident Response Penetration Testing Risk Assessment Intrusion Cyber Hygiene Cyberattack Encryption Spear phishing Insider Threat Threat Actor Virus IDS (Intrusion Detection System) Honeypot Threat Compliance Security Policy IPS (Intrusion Prevention System) Sandbox Ransomware Training Scareware Personally identifiable information (PII) Zero- day Screen lock policy Exploit Data Loss Prevention (DLP) Breach Worm Hashing Phishing Dark web Awareness Threat Intelligence Vulnerability Patch Botnet Trojan Compromise Whale phishing Malware Spoofing Backups Reusing passwords Multi-factor authentication (MFA) Backdoor Endpoint APT (Advanced Persistent Threat) Software updates Digital Certificate Social Engineering Incident Response Penetration Testing Risk Assessment Intrusion Cyber Hygiene Cyberattack Encryption Spear phishing Insider Threat Threat Actor Virus IDS (Intrusion Detection System) Honeypot Threat Compliance Security Policy IPS (Intrusion Prevention System) Sandbox Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Training
Scareware
Personally identifiable information (PII)
Zero-day
Screen lock policy
Exploit
Data Loss Prevention (DLP)
Breach
Worm
Hashing
Phishing
Dark web
Awareness
Threat Intelligence
Vulnerability
Patch
Botnet
Trojan
Compromise
Whale phishing
Malware
Spoofing
Backups
Reusing passwords
Multi-factor authentication (MFA)
Backdoor
Endpoint
APT (Advanced Persistent Threat)
Software updates
Digital Certificate
Social Engineering
Incident Response
Penetration Testing
Risk Assessment
Intrusion
Cyber Hygiene
Cyberattack
Encryption
Spear phishing
Insider Threat
Threat Actor
Virus
IDS (Intrusion Detection System)
Honeypot
Threat
Compliance
Security Policy
IPS (Intrusion Prevention System)
Sandbox
Ransomware