StandardsPasswordPIINetworks12characters80/20BYODPolicySDLCBreachdatabackupRansomwarelockoutProceduresRiskserverSensitiveWormAccessControlPolicyaccountabilitysecurityawarenessdataprivacyInternalUsePhishingThreatLandscapeconfidentialSmishingVishingPretextingGDPRVirusdatabaserestrictedcompromiseAccessControlInformationSecuritycriticalfilesSpearPhishingMFAGuidelinesSocialMediaScamsvulnerabilityTrojanlockoutScampaymentoptioninformationsystemsCybersecurityLandscapedigitaldataSocialEngineeringThreatsecurityDPAinformationclassificationstandardsSLAcookiesPhishingdatasecurityVulnerabilityStandardsPasswordPIINetworks12characters80/20BYODPolicySDLCBreachdatabackupRansomwarelockoutProceduresRiskserverSensitiveWormAccessControlPolicyaccountabilitysecurityawarenessdataprivacyInternalUsePhishingThreatLandscapeconfidentialSmishingVishingPretextingGDPRVirusdatabaserestrictedcompromiseAccessControlInformationSecuritycriticalfilesSpearPhishingMFAGuidelinesSocialMediaScamsvulnerabilityTrojanlockoutScampaymentoptioninformationsystemsCybersecurityLandscapedigitaldataSocialEngineeringThreatsecurityDPAinformationclassificationstandardsSLAcookiesPhishingdatasecurityVulnerability

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. Standards
  2. Password
  3. PII
  4. Networks
  5. 12 characters
  6. 80/20
  7. BYOD
  8. Policy
  9. SDLC
  10. Breach
  11. data
  12. backup
  13. Ransomware
  14. lockout
  15. Procedures
  16. Risk
  17. server
  18. Sensitive
  19. Worm
  20. Access Control Policy
  21. accountability
  22. security awareness
  23. data privacy
  24. Internal Use
  25. Phishing
  26. Threat Landscape
  27. confidential
  28. Smishing
  29. Vishing
  30. Pretexting
  31. GDPR
  32. Virus
  33. database
  34. restricted
  35. compromise
  36. Access Control
  37. Information Security
  38. critical files
  39. Spear Phishing
  40. MFA
  41. Guidelines
  42. Social Media Scams
  43. vulnerability
  44. Trojan
  45. lockout
  46. Scam
  47. payment option
  48. information systems
  49. Cybersecurity Landscape
  50. digital data
  51. Social Engineering
  52. Threat
  53. security
  54. DPA
  55. information classification standards
  56. SLA
  57. cookies
  58. Phishing
  59. data security
  60. Vulnerability