SensitivedataSupplyChainSharedResponsibilityinfosecOnlineSecurityunknownresourcesCyberWarfarecyberattackspersonaldeviceCyberHygienePhishingMobileBankingMalwareCybersecurityExpertiseInternetofThingsWannaCryAttackdisinformationSettlementmulti-factorauthenticatorAssetInventoryInsiderThreatsInfrastuctureCybercriminals80/20CorporateSecurityFinesnetworkCybercrimeAuthenticationhabitsantivirusunsecuredconnectionComplianceemailprotocolCybersecurityTargetedRansomwareDatasecurityOrganizationConfidenceOrganizationsmaliciousemailCleandeskMaliciousSoftwareZeroTrustSmartphonepasswordmanagerVirtualPrivateNetworkCulturePenaltiesDataBreachSocialEngineeringAttackHacksThreatLandscapeAccessrightsBYODPolicy5GNetworkThird-partyRisksystemsVulnerabilitiesBusinessBestPracticesArtificialIntelligencePIICybersecurityAwarenessProgramBreachesCyberthreatsWeakPasswordSensitivedataSupplyChainSharedResponsibilityinfosecOnlineSecurityunknownresourcesCyberWarfarecyberattackspersonaldeviceCyberHygienePhishingMobileBankingMalwareCybersecurityExpertiseInternetofThingsWannaCryAttackdisinformationSettlementmulti-factorauthenticatorAssetInventoryInsiderThreatsInfrastuctureCybercriminals80/20CorporateSecurityFinesnetworkCybercrimeAuthenticationhabitsantivirusunsecuredconnectionComplianceemailprotocolCybersecurityTargetedRansomwareDatasecurityOrganizationConfidenceOrganizationsmaliciousemailCleandeskMaliciousSoftwareZeroTrustSmartphonepasswordmanagerVirtualPrivateNetworkCulturePenaltiesDataBreachSocialEngineeringAttackHacksThreatLandscapeAccessrightsBYODPolicy5GNetworkThird-partyRisksystemsVulnerabilitiesBusinessBestPracticesArtificialIntelligencePIICybersecurityAwarenessProgramBreachesCyberthreatsWeakPassword

ALTPAYNET ANNUAL SAT 2023 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  1. Sensitive data
  2. Supply Chain
  3. Shared Responsibility
  4. infosec
  5. Online Security
  6. unknown resources
  7. Cyber Warfare
  8. cyber attacks
  9. personal device
  10. Cyber Hygiene
  11. Phishing
  12. Mobile Banking Malware
  13. Cybersecurity Expertise
  14. Internet of Things
  15. Wanna Cry Attack
  16. disinformation
  17. Settlement
  18. multi-factor authenticator
  19. Asset Inventory
  20. Insider Threats
  21. Infrastucture
  22. Cybercriminals
  23. 80/20
  24. Corporate Security
  25. Fines
  26. network
  27. Cybercrime
  28. Authentication
  29. habits
  30. antivirus
  31. unsecured connection
  32. Compliance
  33. email protocol
  34. Cybersecurity
  35. Targeted Ransomware
  36. Data security
  37. Organization Confidence
  38. Organizations
  39. malicious email
  40. Clean desk
  41. Malicious Software
  42. Zero Trust
  43. Smartphone
  44. password manager
  45. Virtual Private Network
  46. Culture
  47. Penalties
  48. Data Breach
  49. Social Engineering Attack
  50. Hacks
  51. Threat Landscape
  52. Access rights
  53. BYOD Policy
  54. 5G Network
  55. Third-party Risk
  56. systems
  57. Vulnerabilities
  58. Business
  59. Best Practices
  60. Artificial Intelligence
  61. PII
  62. Cybersecurity Awareness Program
  63. Breaches
  64. Cyberthreats
  65. Weak Password