Spear phishing Zero- day Social Engineering Backups Insider Threat Sandbox Scareware Data Loss Prevention (DLP) Personally identifiable information (PII) Training Digital Certificate Software updates Multi-factor authentication (MFA) Intrusion Ransomware Hashing Compliance Endpoint Threat Intelligence Trojan Malware Backdoor Cyber Hygiene Virus Security Policy APT (Advanced Persistent Threat) Patch Spoofing IPS (Intrusion Prevention System) Risk Assessment Threat Phishing Awareness Vulnerability Botnet Incident Response Encryption Reusing passwords Threat Actor Compromise Exploit Screen lock policy Honeypot IDS (Intrusion Detection System) Breach Worm Penetration Testing Whale phishing Cyberattack Dark web Spear phishing Zero- day Social Engineering Backups Insider Threat Sandbox Scareware Data Loss Prevention (DLP) Personally identifiable information (PII) Training Digital Certificate Software updates Multi-factor authentication (MFA) Intrusion Ransomware Hashing Compliance Endpoint Threat Intelligence Trojan Malware Backdoor Cyber Hygiene Virus Security Policy APT (Advanced Persistent Threat) Patch Spoofing IPS (Intrusion Prevention System) Risk Assessment Threat Phishing Awareness Vulnerability Botnet Incident Response Encryption Reusing passwords Threat Actor Compromise Exploit Screen lock policy Honeypot IDS (Intrusion Detection System) Breach Worm Penetration Testing Whale phishing Cyberattack Dark web
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spear phishing
Zero-day
Social Engineering
Backups
Insider Threat
Sandbox
Scareware
Data Loss Prevention (DLP)
Personally identifiable information (PII)
Training
Digital Certificate
Software updates
Multi-factor authentication (MFA)
Intrusion
Ransomware
Hashing
Compliance
Endpoint
Threat Intelligence
Trojan
Malware
Backdoor
Cyber Hygiene
Virus
Security Policy
APT (Advanced Persistent Threat)
Patch
Spoofing
IPS (Intrusion Prevention System)
Risk Assessment
Threat
Phishing
Awareness
Vulnerability
Botnet
Incident Response
Encryption
Reusing passwords
Threat Actor
Compromise
Exploit
Screen lock policy
Honeypot
IDS (Intrusion Detection System)
Breach
Worm
Penetration Testing
Whale phishing
Cyberattack
Dark web