Point ofInteractionDescopeGDPRAquirerInteractionVoiceResponseIpswichJourneyCyberattackPCISSCCVSSOmnichannelAuditTrailPCIDSSServiceProviderIntrusionPreventationSystemDTMFCardholderSAQRapidRemoteAWSTokenisationDOSDESVJOB0ContactCentrePenetrationTestAgentAssistMulti-FactorAuthenticationCloudPCIForensicInvestigatorEnd-to-endencryptionIntrusionDetectionSystemAOCMissionCDEOSCharlotteQSADifferenceData-FlowDiagramPauseandResumeInformationCommissioner'sOfficeReport onComplianceFree!FirstTrustCNPP2PECompensatingControlsDataBreachPoint ofInteractionDescopeGDPRAquirerInteractionVoiceResponseIpswichJourneyCyberattackPCISSCCVSSOmnichannelAuditTrailPCIDSSServiceProviderIntrusionPreventationSystemDTMFCardholderSAQRapidRemoteAWSTokenisationDOSDESVJOB0ContactCentrePenetrationTestAgentAssistMulti-FactorAuthenticationCloudPCIForensicInvestigatorEnd-to-endencryptionIntrusionDetectionSystemAOCMissionCDEOSCharlotteQSADifferenceData-FlowDiagramPauseandResumeInformationCommissioner'sOfficeReport onComplianceFree!FirstTrustCNPP2PECompensatingControlsDataBreach

PCI Compliance Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Point of Interaction
  2. Descope
  3. GDPR
  4. Aquirer
  5. Interaction Voice Response
  6. Ipswich
  7. Journey
  8. Cyber attack
  9. PCI SSC
  10. CVSS
  11. Omnichannel
  12. Audit Trail
  13. PCI DSS
  14. Service Provider
  15. Intrusion Preventation System
  16. DTMF
  17. Cardholder
  18. SAQ
  19. Rapid Remote
  20. AWS
  21. Tokenisation
  22. DOS
  23. DESV
  24. JOB 0
  25. Contact Centre
  26. Penetration Test
  27. Agent Assist
  28. Multi-Factor Authentication
  29. Cloud
  30. PCI Forensic Investigator
  31. End-to-end encryption
  32. Intrusion Detection System
  33. AOC
  34. Mission
  35. CDE
  36. OS
  37. Charlotte
  38. QSA
  39. Difference
  40. Data-Flow Diagram
  41. Pause and Resume
  42. Information Commissioner's Office
  43. Report on Compliance
  44. Free!
  45. First
  46. Trust
  47. CNP
  48. P2PE
  49. Compensating Controls
  50. Data Breach