SpearPhishingsecurityawarenessSDLCserverpaymentoptionlockoutInformationSecuritylockoutAccessControlPolicycookiesSLAProceduresPIIRiskcompromiseinformationsystemsMFAvulnerabilityPasswordrestrictedPhishingSocialEngineeringinformationclassificationstandardsInternalUseconfidentialaccountabilitydataRansomwareDPASmishingsecurityGDPRBYODCybersecurityLandscapeVulnerabilityVirusNetworksdataprivacycriticalfilesBreach12charactersbackupThreatLandscapeThreatAccessControlTrojanGuidelinesWormdigitaldata80/20datasecurityScamPhishingVishingSocialMediaScamsStandardsPretextingPolicySensitivedatabaseSpearPhishingsecurityawarenessSDLCserverpaymentoptionlockoutInformationSecuritylockoutAccessControlPolicycookiesSLAProceduresPIIRiskcompromiseinformationsystemsMFAvulnerabilityPasswordrestrictedPhishingSocialEngineeringinformationclassificationstandardsInternalUseconfidentialaccountabilitydataRansomwareDPASmishingsecurityGDPRBYODCybersecurityLandscapeVulnerabilityVirusNetworksdataprivacycriticalfilesBreach12charactersbackupThreatLandscapeThreatAccessControlTrojanGuidelinesWormdigitaldata80/20datasecurityScamPhishingVishingSocialMediaScamsStandardsPretextingPolicySensitivedatabase

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. Spear Phishing
  2. security awareness
  3. SDLC
  4. server
  5. payment option
  6. lockout
  7. Information Security
  8. lockout
  9. Access Control Policy
  10. cookies
  11. SLA
  12. Procedures
  13. PII
  14. Risk
  15. compromise
  16. information systems
  17. MFA
  18. vulnerability
  19. Password
  20. restricted
  21. Phishing
  22. Social Engineering
  23. information classification standards
  24. Internal Use
  25. confidential
  26. accountability
  27. data
  28. Ransomware
  29. DPA
  30. Smishing
  31. security
  32. GDPR
  33. BYOD
  34. Cybersecurity Landscape
  35. Vulnerability
  36. Virus
  37. Networks
  38. data privacy
  39. critical files
  40. Breach
  41. 12 characters
  42. backup
  43. Threat Landscape
  44. Threat
  45. Access Control
  46. Trojan
  47. Guidelines
  48. Worm
  49. digital data
  50. 80/20
  51. data security
  52. Scam
  53. Phishing
  54. Vishing
  55. Social Media Scams
  56. Standards
  57. Pretexting
  58. Policy
  59. Sensitive
  60. database