Patch Information Security Access Logs Security Policy Threat Intelligence Virus Spyware Vulnerability Insider Threat Data Leak Network Segmentation Identity Theft Transport Layer Security (TLS) Phishing Endpoint Security Risk Assessment Backup Multi-Factor Authentication (MFA) Compliance Data Privacy Penetration Testing Data Encryption Standard (DES) Cyber Attack Malware Breach Public Key Infrastructure (PKI) Incident Response Security Information and Event Management (SIEM) Certificate of Destruction Authentication Zero- Day Ransomware Encryption Denial-of- Service (DoS) Digital Signature Tokenization Intrusion Detection Security Audit Authorization Session Hijacking Social Engineering Trojan Firewall Cloud Security Biometrics Recovery Plan Access Control Security Awareness Secure Coding Secure Socket Layer (SSL) Patch Information Security Access Logs Security Policy Threat Intelligence Virus Spyware Vulnerability Insider Threat Data Leak Network Segmentation Identity Theft Transport Layer Security (TLS) Phishing Endpoint Security Risk Assessment Backup Multi-Factor Authentication (MFA) Compliance Data Privacy Penetration Testing Data Encryption Standard (DES) Cyber Attack Malware Breach Public Key Infrastructure (PKI) Incident Response Security Information and Event Management (SIEM) Certificate of Destruction Authentication Zero- Day Ransomware Encryption Denial-of- Service (DoS) Digital Signature Tokenization Intrusion Detection Security Audit Authorization Session Hijacking Social Engineering Trojan Firewall Cloud Security Biometrics Recovery Plan Access Control Security Awareness Secure Coding Secure Socket Layer (SSL)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Patch
Information Security
Access Logs
Security Policy
Threat Intelligence
Virus
Spyware
Vulnerability
Insider Threat
Data Leak
Network Segmentation
Identity Theft
Transport Layer Security (TLS)
Phishing
Endpoint Security
Risk Assessment
Backup
Multi-Factor Authentication (MFA)
Compliance
Data Privacy
Penetration Testing
Data Encryption Standard (DES)
Cyber Attack
Malware
Breach
Public Key Infrastructure (PKI)
Incident Response
Security Information and Event Management (SIEM)
Certificate of Destruction
Authentication
Zero-Day
Ransomware
Encryption
Denial-of-Service (DoS)
Digital Signature
Tokenization
Intrusion Detection
Security Audit
Authorization
Session Hijacking
Social Engineering
Trojan
Firewall
Cloud Security
Biometrics
Recovery Plan
Access Control
Security Awareness
Secure Coding
Secure Socket Layer (SSL)