InformationSecuritysecurityawarenessSocialEngineeringsecurityserverThreatcomplianceaccountabilityWormCybersecurityLandscape80/20databaseOWASPlockoutdatasecuritybackupPIIRiskGDPRGuidelinesSpearPhishingSLAAccessControlPolicy12charactersAuditPretextingMFAPhishingDPApaymentgatewayAccessControlTrojandigitaldatavulnerabilityApplicationSecuritySensitiveBYODinformationclassificationstandardsNetworksStandardsinformationsystemsInternalUseProceduresSmishingThreatLandscapecriticalfilesAuthorizationdatadataprivacyPhishingpaymentoptionPolicycompromiseBreachPrivacySocialMediaScamsVulnerabilityRansomwarePasswordVishingScamconfidentialservercookiesAuthenticationSDLCVirusrestrictedInformationSecuritysecurityawarenessSocialEngineeringsecurityserverThreatcomplianceaccountabilityWormCybersecurityLandscape80/20databaseOWASPlockoutdatasecuritybackupPIIRiskGDPRGuidelinesSpearPhishingSLAAccessControlPolicy12charactersAuditPretextingMFAPhishingDPApaymentgatewayAccessControlTrojandigitaldatavulnerabilityApplicationSecuritySensitiveBYODinformationclassificationstandardsNetworksStandardsinformationsystemsInternalUseProceduresSmishingThreatLandscapecriticalfilesAuthorizationdatadataprivacyPhishingpaymentoptionPolicycompromiseBreachPrivacySocialMediaScamsVulnerabilityRansomwarePasswordVishingScamconfidentialservercookiesAuthenticationSDLCVirusrestricted

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. Information Security
  2. security awareness
  3. Social Engineering
  4. security
  5. server
  6. Threat
  7. compliance
  8. accountability
  9. Worm
  10. Cybersecurity Landscape
  11. 80/20
  12. database
  13. OWASP
  14. lockout
  15. data security
  16. backup
  17. PII
  18. Risk
  19. GDPR
  20. Guidelines
  21. Spear Phishing
  22. SLA
  23. Access Control Policy
  24. 12 characters
  25. Audit
  26. Pretexting
  27. MFA
  28. Phishing
  29. DPA
  30. payment gateway
  31. Access Control
  32. Trojan
  33. digital data
  34. vulnerability
  35. Application Security
  36. Sensitive
  37. BYOD
  38. information classification standards
  39. Networks
  40. Standards
  41. information systems
  42. Internal Use
  43. Procedures
  44. Smishing
  45. Threat Landscape
  46. critical files
  47. Authorization
  48. data
  49. data privacy
  50. Phishing
  51. payment option
  52. Policy
  53. compromise
  54. Breach
  55. Privacy
  56. Social Media Scams
  57. Vulnerability
  58. Ransomware
  59. Password
  60. Vishing
  61. Scam
  62. confidential
  63. server
  64. cookies
  65. Authentication
  66. SDLC
  67. Virus
  68. restricted