CyberattackInformationCommissioner'sOfficeCDEContactCentreQSAAuditTrailMulti-FactorAuthenticationTrustDOSOmnichannelIntrusionPreventationSystemInteractionVoiceResponseCloudTokenisationPenetrationTestAOCPauseandResumeCNPPCISSCAWSIpswichCardholderDescopeFree!DifferenceIntrusionDetectionSystemDESVReport onComplianceServiceProviderPCIDSSCVSSData-FlowDiagramAgentAssistEnd-to-endencryptionCompensatingControlsAquirerDTMFGDPRPCIForensicInvestigatorRapidRemoteJOB0JourneyPoint ofInteractionCharlotteMissionSAQFirstOSDataBreachP2PECyberattackInformationCommissioner'sOfficeCDEContactCentreQSAAuditTrailMulti-FactorAuthenticationTrustDOSOmnichannelIntrusionPreventationSystemInteractionVoiceResponseCloudTokenisationPenetrationTestAOCPauseandResumeCNPPCISSCAWSIpswichCardholderDescopeFree!DifferenceIntrusionDetectionSystemDESVReport onComplianceServiceProviderPCIDSSCVSSData-FlowDiagramAgentAssistEnd-to-endencryptionCompensatingControlsAquirerDTMFGDPRPCIForensicInvestigatorRapidRemoteJOB0JourneyPoint ofInteractionCharlotteMissionSAQFirstOSDataBreachP2PE

PCI Compliance Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Cyber attack
  2. Information Commissioner's Office
  3. CDE
  4. Contact Centre
  5. QSA
  6. Audit Trail
  7. Multi-Factor Authentication
  8. Trust
  9. DOS
  10. Omnichannel
  11. Intrusion Preventation System
  12. Interaction Voice Response
  13. Cloud
  14. Tokenisation
  15. Penetration Test
  16. AOC
  17. Pause and Resume
  18. CNP
  19. PCI SSC
  20. AWS
  21. Ipswich
  22. Cardholder
  23. Descope
  24. Free!
  25. Difference
  26. Intrusion Detection System
  27. DESV
  28. Report on Compliance
  29. Service Provider
  30. PCI DSS
  31. CVSS
  32. Data-Flow Diagram
  33. Agent Assist
  34. End-to-end encryption
  35. Compensating Controls
  36. Aquirer
  37. DTMF
  38. GDPR
  39. PCI Forensic Investigator
  40. Rapid Remote
  41. JOB 0
  42. Journey
  43. Point of Interaction
  44. Charlotte
  45. Mission
  46. SAQ
  47. First
  48. OS
  49. Data Breach
  50. P2PE