digitaldatacompliancerestricted80/20dataprivacyPIIDPApaymentgatewayThreatLandscapeSensitivelockoutAccessControlPolicyScamStandardsThreatVishingSDLCvulnerabilityRansomwareserverSpearPhishingSocialMediaScamsPrivacyPhishingaccountabilityAuthenticationPasswordPolicycookies12charactersGDPRVirusBYODPhishingAccessControlinformationsystemsAuthorizationPretextingTrojanApplicationSecurityGuidelinesInformationSecuritySLAconfidentialdatabasecompromiseAuditserverProcedurescriticalfilesSmishingInternalUseSocialEngineeringsecurityawarenessdataCybersecurityLandscapeBreachOWASPWormpaymentoptionMFAdatasecurityRiskNetworksbackupVulnerabilitysecurityinformationclassificationstandardsdigitaldatacompliancerestricted80/20dataprivacyPIIDPApaymentgatewayThreatLandscapeSensitivelockoutAccessControlPolicyScamStandardsThreatVishingSDLCvulnerabilityRansomwareserverSpearPhishingSocialMediaScamsPrivacyPhishingaccountabilityAuthenticationPasswordPolicycookies12charactersGDPRVirusBYODPhishingAccessControlinformationsystemsAuthorizationPretextingTrojanApplicationSecurityGuidelinesInformationSecuritySLAconfidentialdatabasecompromiseAuditserverProcedurescriticalfilesSmishingInternalUseSocialEngineeringsecurityawarenessdataCybersecurityLandscapeBreachOWASPWormpaymentoptionMFAdatasecurityRiskNetworksbackupVulnerabilitysecurityinformationclassificationstandards

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. digital data
  2. compliance
  3. restricted
  4. 80/20
  5. data privacy
  6. PII
  7. DPA
  8. payment gateway
  9. Threat Landscape
  10. Sensitive
  11. lockout
  12. Access Control Policy
  13. Scam
  14. Standards
  15. Threat
  16. Vishing
  17. SDLC
  18. vulnerability
  19. Ransomware
  20. server
  21. Spear Phishing
  22. Social Media Scams
  23. Privacy
  24. Phishing
  25. accountability
  26. Authentication
  27. Password
  28. Policy
  29. cookies
  30. 12 characters
  31. GDPR
  32. Virus
  33. BYOD
  34. Phishing
  35. Access Control
  36. information systems
  37. Authorization
  38. Pretexting
  39. Trojan
  40. Application Security
  41. Guidelines
  42. Information Security
  43. SLA
  44. confidential
  45. database
  46. compromise
  47. Audit
  48. server
  49. Procedures
  50. critical files
  51. Smishing
  52. Internal Use
  53. Social Engineering
  54. security awareness
  55. data
  56. Cybersecurity Landscape
  57. Breach
  58. OWASP
  59. Worm
  60. payment option
  61. MFA
  62. data security
  63. Risk
  64. Networks
  65. backup
  66. Vulnerability
  67. security
  68. information classification standards