InteractionVoiceResponseInformationCommissioner'sOfficeIntrusionPreventationSystemP2PEContactCentreJOB0TrustIntrusionDetectionSystemCNPPCISSCIpswichOmnichannelDataBreachPCIDSSFirstMissionPenetrationTestCDEAquirerAWSSAQPCIForensicInvestigatorMulti-FactorAuthenticationTokenisationCVSSCloudCompensatingControlsOSCharlotteJourneyCyberattackDESVAuditTrailQSADescopeData-FlowDiagramDifferenceServiceProviderPoint ofInteractionPauseandResumeFree!CardholderAgentAssistGDPRRapidRemoteEnd-to-endencryptionDTMFAOCReport onComplianceDOSInteractionVoiceResponseInformationCommissioner'sOfficeIntrusionPreventationSystemP2PEContactCentreJOB0TrustIntrusionDetectionSystemCNPPCISSCIpswichOmnichannelDataBreachPCIDSSFirstMissionPenetrationTestCDEAquirerAWSSAQPCIForensicInvestigatorMulti-FactorAuthenticationTokenisationCVSSCloudCompensatingControlsOSCharlotteJourneyCyberattackDESVAuditTrailQSADescopeData-FlowDiagramDifferenceServiceProviderPoint ofInteractionPauseandResumeFree!CardholderAgentAssistGDPRRapidRemoteEnd-to-endencryptionDTMFAOCReport onComplianceDOS

PCI Compliance Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Interaction Voice Response
  2. Information Commissioner's Office
  3. Intrusion Preventation System
  4. P2PE
  5. Contact Centre
  6. JOB 0
  7. Trust
  8. Intrusion Detection System
  9. CNP
  10. PCI SSC
  11. Ipswich
  12. Omnichannel
  13. Data Breach
  14. PCI DSS
  15. First
  16. Mission
  17. Penetration Test
  18. CDE
  19. Aquirer
  20. AWS
  21. SAQ
  22. PCI Forensic Investigator
  23. Multi-Factor Authentication
  24. Tokenisation
  25. CVSS
  26. Cloud
  27. Compensating Controls
  28. OS
  29. Charlotte
  30. Journey
  31. Cyber attack
  32. DESV
  33. Audit Trail
  34. QSA
  35. Descope
  36. Data-Flow Diagram
  37. Difference
  38. Service Provider
  39. Point of Interaction
  40. Pause and Resume
  41. Free!
  42. Cardholder
  43. Agent Assist
  44. GDPR
  45. Rapid Remote
  46. End-to-end encryption
  47. DTMF
  48. AOC
  49. Report on Compliance
  50. DOS