(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
MITRE ATT&CK™ Framework
WAFMan-in-theMiddle Attack
Anti-Malware
Digital Transformation
SIM Swapping
Virus
Anti-BotnetEncryption
Data Breach
Critical InfrastructureSECaaS
Malvertising
Threat Hunting
BYOL
BYOD
Secure Socket Layer (SSL)
Business Continuity Plan
Hacker
Exploit
Data Theft
Risktool
Anti-Phishing
Cyberbullying
Phishing
Whitelist, Allowlist
Patch
Pen Testing
Process Hollowing
Cryptojacking
Rootkit
Banker Trojan
Backdoor
IoT
MalwareVPNBusiness Disruption
CAPTCHA
BYOCIdentity
Decryption
Social Engineering
Anti-Virus
Honeypot
Sandbox(ing)
White Hat - Black Hat
Endpoint ProtectionSpoofing
Fileless Malware
Zero-day Exploit
Threat Assessment
Botnet
Clickjacking
Spyware
Security Incident Response
Authentication
Ransomware
Data LossPrevention (DLP)Digital ForensicsSpear Phishing