(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Authentication
Pen Testing
Exploit
Remote Desktop Protocol (RDP)
Whitelist, Allowlist
Endpoint ProtectionSpoofing
Critical InfrastructureSECaaS
BYOD
Botnet
Anti-Malware
Virus
Process Hollowing
SIM Swapping
Data Breach
In-line Network Device
Brute Force Attack
Backdoor
Business Continuity Plan
Keylogger
Data Theft
White Hat - Black Hat
Honeypot
Clientless
Banker Trojan
Malvertising
Decryption
Attack Vector
Ransomware
Phishing
Sandbox(ing)
Drive By Download Attack
CybersecurityScareware
AdwareDDoS
MITRE ATT&CK™ Framework
BYOCIdentity
WAFMan-in-theMiddle Attack
Hacker
BYOL
Spyware
PII
Risktool
Rootkit
Anti-Phishing
Dark Web
Cyberbullying
Fast Identity Online (FIDO)
IoT
Threat Intelligence
Cryptojacking
Anti-BotnetEncryption
Insider Threat
Digital Transformation
Social Engineering
Anti-Virus
Data LossPrevention (DLP)Digital ForensicsSpear Phishing