WorkloadIdentityExcessiveAgencyRAGComplianceVectorDatabaseMachineLearningDeepfakeAttacksCyberResilienceNeuralNetworksEncryptionAI SecurityPostureManagementAIRuntimeSecurityLLMHallucinationAgenticAIISO/IEC42001PromptInjectionConfidentialComputingThreatHunting.MCPAIFirewallZeroTrustSensitiveInfoDisclosureCloudSecurityDataPrivacyWorkloadIdentityExcessiveAgencyRAGComplianceVectorDatabaseMachineLearningDeepfakeAttacksCyberResilienceNeuralNetworksEncryptionAI SecurityPostureManagementAIRuntimeSecurityLLMHallucinationAgenticAIISO/IEC42001PromptInjectionConfidentialComputingThreatHunting.MCPAIFirewallZeroTrustSensitiveInfoDisclosureCloudSecurityDataPrivacy

THALES BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Workload Identity
  2. Excessive Agency
  3. RAG
  4. Compliance
  5. Vector Database
  6. Machine Learning
  7. Deepfake Attacks
  8. Cyber Resilience
  9. Neural Networks
  10. Encryption
  11. AI Security Posture Management
  12. AI Runtime Security
  13. LLM Hallucination
  14. Agentic AI
  15. ISO/IEC 42001
  16. Prompt Injection
  17. Confidential Computing
  18. Threat Hunting.
  19. MCP
  20. AI Firewall
  21. Zero Trust
  22. Sensitive Info Disclosure
  23. Cloud Security
  24. Data Privacy