SpearPhishingserverRansomwarerestrictedinformationclassificationstandardsSmishingSocialEngineeringPIIvulnerabilitysecurityawarenessdatasecuritybackupBreachPhishinginformationsystemsGDPRInformationSecuritysecurityBYODPhishinglockoutVulnerabilitydatadataprivacy12charactersSensitivecompromiseAccessControlPolicyAccessControlPasswordTrojanVirusMFAcriticalfilescookiesPretextingScampaymentoptionconfidential80/20GuidelinesSocialMediaScamsdigitaldataThreatNetworksPolicyInternalUselockoutSDLCSLAStandardsVishingThreatLandscapeProceduresCybersecurityLandscapeDPAWormRiskdatabaseaccountabilitySpearPhishingserverRansomwarerestrictedinformationclassificationstandardsSmishingSocialEngineeringPIIvulnerabilitysecurityawarenessdatasecuritybackupBreachPhishinginformationsystemsGDPRInformationSecuritysecurityBYODPhishinglockoutVulnerabilitydatadataprivacy12charactersSensitivecompromiseAccessControlPolicyAccessControlPasswordTrojanVirusMFAcriticalfilescookiesPretextingScampaymentoptionconfidential80/20GuidelinesSocialMediaScamsdigitaldataThreatNetworksPolicyInternalUselockoutSDLCSLAStandardsVishingThreatLandscapeProceduresCybersecurityLandscapeDPAWormRiskdatabaseaccountability

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. Spear Phishing
  2. server
  3. Ransomware
  4. restricted
  5. information classification standards
  6. Smishing
  7. Social Engineering
  8. PII
  9. vulnerability
  10. security awareness
  11. data security
  12. backup
  13. Breach
  14. Phishing
  15. information systems
  16. GDPR
  17. Information Security
  18. security
  19. BYOD
  20. Phishing
  21. lockout
  22. Vulnerability
  23. data
  24. data privacy
  25. 12 characters
  26. Sensitive
  27. compromise
  28. Access Control Policy
  29. Access Control
  30. Password
  31. Trojan
  32. Virus
  33. MFA
  34. critical files
  35. cookies
  36. Pretexting
  37. Scam
  38. payment option
  39. confidential
  40. 80/20
  41. Guidelines
  42. Social Media Scams
  43. digital data
  44. Threat
  45. Networks
  46. Policy
  47. Internal Use
  48. lockout
  49. SDLC
  50. SLA
  51. Standards
  52. Vishing
  53. Threat Landscape
  54. Procedures
  55. Cybersecurity Landscape
  56. DPA
  57. Worm
  58. Risk
  59. database
  60. accountability