Surveillance Security Breach Email Phishing Control Measures Public Wi-Fi Personal Security Threat Assessment Badge Security Compliance Critical Information Information Lifecycle Access Control Network Security Secure Disposal Awareness Security Audit Digital Footprint Data Breach Third- Party Access Here’s a list of 75 OPSEC- related words and phrases to use for your bingo game: Hybrid Schedule Privacy Settings Situational Awareness Malware Training Social Media Oversharing Zero Trust Access Logs Threat Mitigation Security Culture Classified Red Flags Spyware Data Loss Best Practices Cloud Security Vulnerability Unauthorized Access Tailgating Identity Theft Encryption USB Risks Indicator Two-Factor Authentication Visitor Policy Information Sharing Social Engineering Operational Plan Need- to- Know OPSEC Cycle Document Security Sensitive Information Secure Communication Laptop Security Security Policy Incident Reporting Multi- layer Security Insider Threat Workstation Locking Behavioral Patterns Analysis Adversary Authentication Remote Work Firewall Third- Party Risks Confidentiality Security Clearance Countermeasures Physical Security Data Encryption Password Hygiene Monitoring Cybersecurity Risk Surveillance Security Breach Email Phishing Control Measures Public Wi-Fi Personal Security Threat Assessment Badge Security Compliance Critical Information Information Lifecycle Access Control Network Security Secure Disposal Awareness Security Audit Digital Footprint Data Breach Third- Party Access Here’s a list of 75 OPSEC- related words and phrases to use for your bingo game: Hybrid Schedule Privacy Settings Situational Awareness Malware Training Social Media Oversharing Zero Trust Access Logs Threat Mitigation Security Culture Classified Red Flags Spyware Data Loss Best Practices Cloud Security Vulnerability Unauthorized Access Tailgating Identity Theft Encryption USB Risks Indicator Two-Factor Authentication Visitor Policy Information Sharing Social Engineering Operational Plan Need- to- Know OPSEC Cycle Document Security Sensitive Information Secure Communication Laptop Security Security Policy Incident Reporting Multi- layer Security Insider Threat Workstation Locking Behavioral Patterns Analysis Adversary Authentication Remote Work Firewall Third- Party Risks Confidentiality Security Clearance Countermeasures Physical Security Data Encryption Password Hygiene Monitoring Cybersecurity Risk
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Surveillance
G-Security Breach
G-Email Phishing
G-Control Measures
N-Public Wi-Fi
I-Personal Security
B-Threat Assessment
G-Badge Security
B-Compliance
O-Critical Information
N-Information Lifecycle
G-Access Control
G-Network Security
N-Secure Disposal
N-Awareness
N-Security Audit
G-Digital Footprint
O-Data Breach
O-Third-Party Access
B-Here’s a list of 75 OPSEC-related words and phrases to use for your bingo game:
I-Hybrid Schedule
G-Privacy Settings
O-Situational Awareness
O-Malware
I-Training
B-Social Media
O-Oversharing
G-Zero Trust
B-Access Logs
I-Threat Mitigation
G-Security Culture
B-Classified
N-Red Flags
O-Spyware
G-Data Loss
B-Best Practices
I-Cloud Security
I-Vulnerability
G-Unauthorized Access
I-Tailgating
B-Identity Theft
B-Encryption
N-USB Risks
N-Indicator
N-Two-Factor Authentication
O-Visitor Policy
O-Information Sharing
B-Social Engineering
N-Operational Plan
I-Need-to-Know
I-OPSEC Cycle
B-Document Security
G-Sensitive Information
O-Secure Communication
O-Laptop Security
O-Security Policy
N-Incident Reporting
B-Multi-layer Security
N-Insider Threat
B-Workstation Locking
I-Behavioral Patterns
N-Analysis
G-Adversary
I-Authentication
B-Remote Work
I-Firewall
I-Third-Party Risks
G-Confidentiality
O-Security Clearance
N-Countermeasures
I-Physical Security
B-Data Encryption
O-Password Hygiene
O-Monitoring
N-Cybersecurity
I-Risk