(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Firewall
Security Incident Response
Data Theft
Sandbox(ing)
Fast Identity Online (FIDO)
Dark Web
Vulnerability
Cryptojacking
Honeypot
Business Continuity Plan
Remote Desktop Protocol (RDP)
Data IntegrityParental Controls
In-line Network Device
IoT
BYOL
Spam
White Hat - Black Hat
CybersecurityScareware
Anti-Phishing
Brute Force Attack
PII
Exploit
Risktool
Whitelist, Allowlist
Insider Threat
Keylogger
Authentication
WAFMan-in-theMiddle Attack
Threat Intelligence
Ransomware
Botnet
MITRE ATT&CK™ Framework
Spyware
Hacker
Drive By Download Attack
Digital Transformation
CAPTCHA
Threat Hunting
Greylist
MalwareVPNBusiness Disruption
Phishing
Anti-Malware
Patch
Secure Socket Layer (SSL)
Attack Vector
Social Engineering
Zero-day Exploit
Endpoint ProtectionSpoofing
Threat Assessment
Process Hollowing
Backdoor
Pen Testing
Two-step Authentification
Decryption
Clickjacking
Critical InfrastructureSECaaS
Rootkit
Cyberbullying
Data LossPrevention (DLP)Digital ForensicsSpear Phishing