WorkloadIdentityPromptInjectionNeuralNetworksComplianceAgenticAIVectorDatabaseCyberResilienceSensitiveInfoDisclosureZeroTrustEncryptionLLMHallucinationRAGMachineLearningDeepfakeAttacksAI SecurityPostureManagementMCPISO/IEC42001AIRuntimeSecurityDataPrivacyConfidentialComputingThreatHunting.ExcessiveAgencyAIFirewallCloudSecurityWorkloadIdentityPromptInjectionNeuralNetworksComplianceAgenticAIVectorDatabaseCyberResilienceSensitiveInfoDisclosureZeroTrustEncryptionLLMHallucinationRAGMachineLearningDeepfakeAttacksAI SecurityPostureManagementMCPISO/IEC42001AIRuntimeSecurityDataPrivacyConfidentialComputingThreatHunting.ExcessiveAgencyAIFirewallCloudSecurity

THALES BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Workload Identity
  2. Prompt Injection
  3. Neural Networks
  4. Compliance
  5. Agentic AI
  6. Vector Database
  7. Cyber Resilience
  8. Sensitive Info Disclosure
  9. Zero Trust
  10. Encryption
  11. LLM Hallucination
  12. RAG
  13. Machine Learning
  14. Deepfake Attacks
  15. AI Security Posture Management
  16. MCP
  17. ISO/IEC 42001
  18. AI Runtime Security
  19. Data Privacy
  20. Confidential Computing
  21. Threat Hunting.
  22. Excessive Agency
  23. AI Firewall
  24. Cloud Security