databaseBreachrestrictedAccessControlGDPRProceduresSensitiveinformationsystemsVulnerabilityPhishingMFA80/20securitycookiesdatasecuritybackupinformationclassificationstandardslockoutSpearPhishingPasswordSocialEngineeringaccountabilityNetworksdigitaldatadatapaymentoptionInformationSecuritylockoutRansomwareGuidelinesWormAccessControlPolicyPolicyPhishingconfidentialSDLCThreatLandscapecriticalfilesSmishing12charactersInternalUsevulnerabilitydataprivacyScamThreatCybersecurityLandscapeBYODsecurityawarenessPIIcompromiseDPAVishingVirusSLAStandardsTrojanRiskSocialMediaScamsserverPretextingdatabaseBreachrestrictedAccessControlGDPRProceduresSensitiveinformationsystemsVulnerabilityPhishingMFA80/20securitycookiesdatasecuritybackupinformationclassificationstandardslockoutSpearPhishingPasswordSocialEngineeringaccountabilityNetworksdigitaldatadatapaymentoptionInformationSecuritylockoutRansomwareGuidelinesWormAccessControlPolicyPolicyPhishingconfidentialSDLCThreatLandscapecriticalfilesSmishing12charactersInternalUsevulnerabilitydataprivacyScamThreatCybersecurityLandscapeBYODsecurityawarenessPIIcompromiseDPAVishingVirusSLAStandardsTrojanRiskSocialMediaScamsserverPretexting

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. database
  2. Breach
  3. restricted
  4. Access Control
  5. GDPR
  6. Procedures
  7. Sensitive
  8. information systems
  9. Vulnerability
  10. Phishing
  11. MFA
  12. 80/20
  13. security
  14. cookies
  15. data security
  16. backup
  17. information classification standards
  18. lockout
  19. Spear Phishing
  20. Password
  21. Social Engineering
  22. accountability
  23. Networks
  24. digital data
  25. data
  26. payment option
  27. Information Security
  28. lockout
  29. Ransomware
  30. Guidelines
  31. Worm
  32. Access Control Policy
  33. Policy
  34. Phishing
  35. confidential
  36. SDLC
  37. Threat Landscape
  38. critical files
  39. Smishing
  40. 12 characters
  41. Internal Use
  42. vulnerability
  43. data privacy
  44. Scam
  45. Threat
  46. Cybersecurity Landscape
  47. BYOD
  48. security awareness
  49. PII
  50. compromise
  51. DPA
  52. Vishing
  53. Virus
  54. SLA
  55. Standards
  56. Trojan
  57. Risk
  58. Social Media Scams
  59. server
  60. Pretexting