accountabilityinformationclassificationstandardsInformationSecuritypaymentoptionPhishingAccessControlPolicydataprivacyGuidelinesrestricteddatasecurityInternalUseSLARansomwareconfidentialRiskWormSocialEngineeringBYODSensitiveSDLCcompromisesecurityvulnerability12charactersThreatDPAThreatLandscapeserverSmishingSpearPhishingPasswordlockoutSocialMediaScamsdataVulnerabilityPretextingPhishingVirusScamTrojan80/20PolicycriticalfilesMFAAccessControlStandardsBreachdigitaldataPIICybersecurityLandscapecookiessecurityawarenessbackupinformationsystemsGDPRVishingProcedureslockoutdatabaseNetworksaccountabilityinformationclassificationstandardsInformationSecuritypaymentoptionPhishingAccessControlPolicydataprivacyGuidelinesrestricteddatasecurityInternalUseSLARansomwareconfidentialRiskWormSocialEngineeringBYODSensitiveSDLCcompromisesecurityvulnerability12charactersThreatDPAThreatLandscapeserverSmishingSpearPhishingPasswordlockoutSocialMediaScamsdataVulnerabilityPretextingPhishingVirusScamTrojan80/20PolicycriticalfilesMFAAccessControlStandardsBreachdigitaldataPIICybersecurityLandscapecookiessecurityawarenessbackupinformationsystemsGDPRVishingProcedureslockoutdatabaseNetworks

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. accountability
  2. information classification standards
  3. Information Security
  4. payment option
  5. Phishing
  6. Access Control Policy
  7. data privacy
  8. Guidelines
  9. restricted
  10. data security
  11. Internal Use
  12. SLA
  13. Ransomware
  14. confidential
  15. Risk
  16. Worm
  17. Social Engineering
  18. BYOD
  19. Sensitive
  20. SDLC
  21. compromise
  22. security
  23. vulnerability
  24. 12 characters
  25. Threat
  26. DPA
  27. Threat Landscape
  28. server
  29. Smishing
  30. Spear Phishing
  31. Password
  32. lockout
  33. Social Media Scams
  34. data
  35. Vulnerability
  36. Pretexting
  37. Phishing
  38. Virus
  39. Scam
  40. Trojan
  41. 80/20
  42. Policy
  43. critical files
  44. MFA
  45. Access Control
  46. Standards
  47. Breach
  48. digital data
  49. PII
  50. Cybersecurity Landscape
  51. cookies
  52. security awareness
  53. backup
  54. information systems
  55. GDPR
  56. Vishing
  57. Procedures
  58. lockout
  59. database
  60. Networks