DataBreachIpswichCompensatingControlsIntrusionPreventationSystemPCIForensicInvestigatorDOSAOCReport onComplianceCyberattackFree!PauseandResumeAgentAssistAWSOmnichannelRapidRemotePCIDSSGDPRPCISSCContactCentreOSData-FlowDiagramCNPJourneyCDEFirstCardholderIntrusionDetectionSystemInteractionVoiceResponseCloudMissionJOB0AquirerAuditTrailDescopeServiceProviderCVSSMulti-FactorAuthenticationPoint ofInteractionDESVTokenisationInformationCommissioner'sOfficeQSAPenetrationTestDTMFSAQCharlotteDifferenceTrustP2PEEnd-to-endencryptionDataBreachIpswichCompensatingControlsIntrusionPreventationSystemPCIForensicInvestigatorDOSAOCReport onComplianceCyberattackFree!PauseandResumeAgentAssistAWSOmnichannelRapidRemotePCIDSSGDPRPCISSCContactCentreOSData-FlowDiagramCNPJourneyCDEFirstCardholderIntrusionDetectionSystemInteractionVoiceResponseCloudMissionJOB0AquirerAuditTrailDescopeServiceProviderCVSSMulti-FactorAuthenticationPoint ofInteractionDESVTokenisationInformationCommissioner'sOfficeQSAPenetrationTestDTMFSAQCharlotteDifferenceTrustP2PEEnd-to-endencryption

PCI Compliance Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Data Breach
  2. Ipswich
  3. Compensating Controls
  4. Intrusion Preventation System
  5. PCI Forensic Investigator
  6. DOS
  7. AOC
  8. Report on Compliance
  9. Cyber attack
  10. Free!
  11. Pause and Resume
  12. Agent Assist
  13. AWS
  14. Omnichannel
  15. Rapid Remote
  16. PCI DSS
  17. GDPR
  18. PCI SSC
  19. Contact Centre
  20. OS
  21. Data-Flow Diagram
  22. CNP
  23. Journey
  24. CDE
  25. First
  26. Cardholder
  27. Intrusion Detection System
  28. Interaction Voice Response
  29. Cloud
  30. Mission
  31. JOB 0
  32. Aquirer
  33. Audit Trail
  34. Descope
  35. Service Provider
  36. CVSS
  37. Multi-Factor Authentication
  38. Point of Interaction
  39. DESV
  40. Tokenisation
  41. Information Commissioner's Office
  42. QSA
  43. Penetration Test
  44. DTMF
  45. SAQ
  46. Charlotte
  47. Difference
  48. Trust
  49. P2PE
  50. End-to-end encryption