CybersecurityLandscapedataprivacyPolicyGuidelinesdataVulnerabilityAccessControlInternalUsebackupSpearPhishinginformationclassificationstandardscookiesPhishingPasswordSmishingAccessControlPolicydigitaldataProceduresdatabaseDPAStandardsserversecurityawarenessInformationSecurityThreatLandscapevulnerabilitySocialMediaScamscriticalfilesGDPRSLARisklockoutPretextingVirusinformationsystemsBYODrestrictedSDLCcompromiseNetworksconfidentialSocialEngineeringsecurityScamdatasecuritylockoutaccountabilityWormPhishingTrojan12charactersThreatSensitivepaymentoption80/20VishingMFABreachRansomwarePIICybersecurityLandscapedataprivacyPolicyGuidelinesdataVulnerabilityAccessControlInternalUsebackupSpearPhishinginformationclassificationstandardscookiesPhishingPasswordSmishingAccessControlPolicydigitaldataProceduresdatabaseDPAStandardsserversecurityawarenessInformationSecurityThreatLandscapevulnerabilitySocialMediaScamscriticalfilesGDPRSLARisklockoutPretextingVirusinformationsystemsBYODrestrictedSDLCcompromiseNetworksconfidentialSocialEngineeringsecurityScamdatasecuritylockoutaccountabilityWormPhishingTrojan12charactersThreatSensitivepaymentoption80/20VishingMFABreachRansomwarePII

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. Cybersecurity Landscape
  2. data privacy
  3. Policy
  4. Guidelines
  5. data
  6. Vulnerability
  7. Access Control
  8. Internal Use
  9. backup
  10. Spear Phishing
  11. information classification standards
  12. cookies
  13. Phishing
  14. Password
  15. Smishing
  16. Access Control Policy
  17. digital data
  18. Procedures
  19. database
  20. DPA
  21. Standards
  22. server
  23. security awareness
  24. Information Security
  25. Threat Landscape
  26. vulnerability
  27. Social Media Scams
  28. critical files
  29. GDPR
  30. SLA
  31. Risk
  32. lockout
  33. Pretexting
  34. Virus
  35. information systems
  36. BYOD
  37. restricted
  38. SDLC
  39. compromise
  40. Networks
  41. confidential
  42. Social Engineering
  43. security
  44. Scam
  45. data security
  46. lockout
  47. accountability
  48. Worm
  49. Phishing
  50. Trojan
  51. 12 characters
  52. Threat
  53. Sensitive
  54. payment option
  55. 80/20
  56. Vishing
  57. MFA
  58. Breach
  59. Ransomware
  60. PII