AgentAssistCharlotteAquirerDOSEnd-to-endencryptionDifferenceData-FlowDiagramInformationCommissioner'sOfficeQSAContactCentreAuditTrailInteractionVoiceResponseCNPIntrusionPreventationSystemPenetrationTestJOB0Point ofInteractionOmnichannelPCIForensicInvestigatorPauseandResumeGDPRTokenisationFirstCardholderSAQAWSPCIDSSIntrusionDetectionSystemCVSSOSMulti-FactorAuthenticationReport onComplianceFree!CDEPCISSCCloudP2PEServiceProviderDescopeJourneyIpswichDESVMissionTrustDataBreachCompensatingControlsDTMFRapidRemoteAOCCyberattackAgentAssistCharlotteAquirerDOSEnd-to-endencryptionDifferenceData-FlowDiagramInformationCommissioner'sOfficeQSAContactCentreAuditTrailInteractionVoiceResponseCNPIntrusionPreventationSystemPenetrationTestJOB0Point ofInteractionOmnichannelPCIForensicInvestigatorPauseandResumeGDPRTokenisationFirstCardholderSAQAWSPCIDSSIntrusionDetectionSystemCVSSOSMulti-FactorAuthenticationReport onComplianceFree!CDEPCISSCCloudP2PEServiceProviderDescopeJourneyIpswichDESVMissionTrustDataBreachCompensatingControlsDTMFRapidRemoteAOCCyberattack

PCI Compliance Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Agent Assist
  2. Charlotte
  3. Aquirer
  4. DOS
  5. End-to-end encryption
  6. Difference
  7. Data-Flow Diagram
  8. Information Commissioner's Office
  9. QSA
  10. Contact Centre
  11. Audit Trail
  12. Interaction Voice Response
  13. CNP
  14. Intrusion Preventation System
  15. Penetration Test
  16. JOB 0
  17. Point of Interaction
  18. Omnichannel
  19. PCI Forensic Investigator
  20. Pause and Resume
  21. GDPR
  22. Tokenisation
  23. First
  24. Cardholder
  25. SAQ
  26. AWS
  27. PCI DSS
  28. Intrusion Detection System
  29. CVSS
  30. OS
  31. Multi-Factor Authentication
  32. Report on Compliance
  33. Free!
  34. CDE
  35. PCI SSC
  36. Cloud
  37. P2PE
  38. Service Provider
  39. Descope
  40. Journey
  41. Ipswich
  42. DESV
  43. Mission
  44. Trust
  45. Data Breach
  46. Compensating Controls
  47. DTMF
  48. Rapid Remote
  49. AOC
  50. Cyber attack