InfrastructureLogRhythmSCCMProcessorFieldservicesSDLCIdentitymanagementDisasterrecoveryProgramSigCappadLogisticsMFAVulnerabilitiesIntrusionpreventionSpamOperationsScopingdocumentPortfoliomanagementMalwareForecastRemoteaccessAuditOmnichannelDashboardRiskregisterAutomationIntrusiondetectionSarbanes-OxleyIFSComplianceWorkBreakdownstructureDepreciationScopecreepEnterpriseCapacityOracleStoresWirelessMMATUnauthorizedSecuritypolicyiPadDeliveryExcelSpreadsheetLoginTrainingBaselineAccountabilitymacys.comConfidentialityDataFlowDiagramTrojanGovernancekickoffIntrusionFirewallIssuePermissionsSCOMAvailabilityMeetingMakeMagicJobcodeBRDFittingroomCharterdocumentOutlookEventVerizonHeraldSquareProtectionEmailScheduleCapitalWorkFlowFinanceUNIXThreatsEnforcementVirusGovernancePeopletrakRiskassessmentSOXAuthenticationEthicsPointof saleAnti-virusEULABusinessrequirementLessonslearnedForensicsAccesspointIncidentmanagementEmployeeidMOMebsFishnetEncryptionAuthenticationBigticketDataclassificationSPACEMobilityMSProjectPatchesBalanceSheetIdentitytheftRouterHackersiExpenseEmailCitiCRUSPACEDatabaseYearendSOCiPodBudgetFileintegrityDashboardAccountnumbersContracttermsLY vs. TYcomparisonPasswordsImplementationPurchaseRequestProceduresExploitIntegrityAuthenticationCreditcardScannerDragonRiskManagementConstraintsSanFranciscoAuthorizationRegisterInformationRolesWormDomainnamesMonitoringPCIBalancesheetSoftwareIncidentSwitchProjectmanagementRiskHoneypotsFiscalCalendarAwarenessIEQContractsJohnsCreekCharterLorainApplepayExpensePipelineServerFirewallProjectProcessmapRegulationPhishingUserprofileEnd of LifereplacementTollgateVendorLoggingPrivacyBRDCompareplan toactualBYODMSTIBM/IGSChangeInfrastructureLogRhythmSCCMProcessorFieldservicesSDLCIdentitymanagementDisasterrecoveryProgramSigCappadLogisticsMFAVulnerabilitiesIntrusionpreventionSpamOperationsScopingdocumentPortfoliomanagementMalwareForecastRemoteaccessAuditOmnichannelDashboardRiskregisterAutomationIntrusiondetectionSarbanes-OxleyIFSComplianceWorkBreakdownstructureDepreciationScopecreepEnterpriseCapacityOracleStoresWirelessMMATUnauthorizedSecuritypolicyiPadDeliveryExcelSpreadsheetLoginTrainingBaselineAccountabilitymacys.comConfidentialityDataFlowDiagramTrojanGovernancekickoffIntrusionFirewallIssuePermissionsSCOMAvailabilityMeetingMakeMagicJobcodeBRDFittingroomCharterdocumentOutlookEventVerizonHeraldSquareProtectionEmailScheduleCapitalWorkFlowFinanceUNIXThreatsEnforcementVirusGovernancePeopletrakRiskassessmentSOXAuthenticationEthicsPointof saleAnti-virusEULABusinessrequirementLessonslearnedForensicsAccesspointIncidentmanagementEmployeeidMOMebsFishnetEncryptionAuthenticationBigticketDataclassificationSPACEMobilityMSProjectPatchesBalanceSheetIdentitytheftRouterHackersiExpenseEmailCitiCRUSPACEDatabaseYearendSOCiPodBudgetFileintegrityDashboardAccountnumbersContracttermsLY vs. TYcomparisonPasswordsImplementationPurchaseRequestProceduresExploitIntegrityAuthenticationCreditcardScannerDragonRiskManagementConstraintsSanFranciscoAuthorizationRegisterInformationRolesWormDomainnamesMonitoringPCIBalancesheetSoftwareIncidentSwitchProjectmanagementRiskHoneypotsFiscalCalendarAwarenessIEQContractsJohnsCreekCharterLorainApplepayExpensePipelineServerFirewallProjectProcessmapRegulationPhishingUserprofileEnd of LifereplacementTollgateVendorLoggingPrivacyBRDCompareplan toactualBYODMSTIBM/IGSChange

Larry Del Pyramid Team Building Event - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
  1. Infrastructure
  2. Log Rhythm
  3. SCCM
  4. Processor
  5. Field services
  6. SDLC
  7. Identity management
  8. Disaster recovery
  9. Program
  10. Sig Cap pad
  11. Logistics
  12. MFA
  13. Vulnerabilities
  14. Intrusion prevention
  15. Spam
  16. Operations
  17. Scoping document
  18. Portfolio management
  19. Malware
  20. Forecast
  21. Remote access
  22. Audit
  23. Omnichannel
  24. Dashboard
  25. Risk register
  26. Automation
  27. Intrusion detection
  28. Sarbanes-Oxley
  29. IFS
  30. Compliance
  31. Work Breakdown structure
  32. Depreciation
  33. Scope creep
  34. Enterprise
  35. Capacity
  36. Oracle
  37. Stores
  38. Wireless
  39. MMAT
  40. Unauthorized
  41. Security policy
  42. iPad
  43. Delivery
  44. Excel Spreadsheet
  45. Login
  46. Training
  47. Baseline
  48. Accountability
  49. macys.com
  50. Confidentiality
  51. Data Flow Diagram
  52. Trojan
  53. Governance
  54. kick off
  55. Intrusion
  56. Firewall
  57. Issue
  58. Permissions
  59. SCOM
  60. Availability
  61. Meeting
  62. Make Magic
  63. Job code
  64. BRD
  65. Fitting room
  66. Charter document
  67. Outlook
  68. Event
  69. Verizon
  70. Herald Square
  71. Protection
  72. Email
  73. Schedule
  74. Capital
  75. Work Flow
  76. Finance
  77. UNIX
  78. Threats
  79. Enforcement
  80. Virus
  81. Governance
  82. Peopletrak
  83. Risk assessment
  84. SOX
  85. Authentication
  86. Ethics
  87. Point of sale
  88. Anti-virus
  89. EULA
  90. Business requirement
  91. Lessons learned
  92. Forensics
  93. Access point
  94. Incident management
  95. Employee id
  96. MOM
  97. ebs
  98. Fishnet
  99. Encryption
  100. Authentication
  101. Big ticket
  102. Data classification
  103. SPACE
  104. Mobility
  105. MS Project
  106. Patches
  107. Balance Sheet
  108. Identity theft
  109. Router
  110. Hackers
  111. iExpense
  112. Email
  113. Citi
  114. CRU
  115. SPACE
  116. Database
  117. Year end
  118. SOC
  119. iPod
  120. Budget
  121. File integrity
  122. Dashboard
  123. Account numbers
  124. Contract terms
  125. LY vs. TY comparison
  126. Passwords
  127. Implementation
  128. Purchase Request
  129. Procedures
  130. Exploit
  131. Integrity
  132. Authentication
  133. Credit card
  134. Scanner
  135. Dragon
  136. Risk Management
  137. Constraints
  138. San Francisco
  139. Authorization
  140. Register
  141. Information
  142. Roles
  143. Worm
  144. Domain names
  145. Monitoring
  146. PCI
  147. Balance sheet
  148. Software
  149. Incident
  150. Switch
  151. Project management
  152. Risk
  153. Honeypots
  154. Fiscal Calendar
  155. Awareness
  156. IEQ
  157. Contracts
  158. Johns Creek
  159. Charter
  160. Lorain
  161. Apple pay
  162. Expense
  163. Pipeline
  164. Server
  165. Firewall
  166. Project
  167. Process map
  168. Regulation
  169. Phishing
  170. User profile
  171. End of Life replacement
  172. Tollgate
  173. Vendor
  174. Logging
  175. Privacy
  176. BRD
  177. Compare plan to actual
  178. BYOD
  179. MST
  180. IBM/IGS
  181. Change