PrivacysecuritylockoutconfidentialCybersecurityLandscapeWormPretextingdigitaldataDPAMFAApplicationSecurityPIIThreatinformationclassificationstandardsAuditbackupRiskProceduresSDLCPhishingBreachserversecurityawarenesscomplianceSmishingAuthenticationVirusdataprivacyAuthorizationinformationsystemsGuidelinesAccessControlPolicyGDPRStandardsScamcookiesVulnerabilityVishingPolicyPhishingSocialEngineeringSocialMediaScamsrestrictedThreatLandscapeaccountabilitySLAOWASPAccessControlPassword12characterscompromisepaymentgatewayInternalUsevulnerabilitydatabaseNetworksInformationSecurityBYODpaymentoptionSpearPhishingcriticalfilesdatasecuritydataTrojanRansomwareserver80/20SensitivePrivacysecuritylockoutconfidentialCybersecurityLandscapeWormPretextingdigitaldataDPAMFAApplicationSecurityPIIThreatinformationclassificationstandardsAuditbackupRiskProceduresSDLCPhishingBreachserversecurityawarenesscomplianceSmishingAuthenticationVirusdataprivacyAuthorizationinformationsystemsGuidelinesAccessControlPolicyGDPRStandardsScamcookiesVulnerabilityVishingPolicyPhishingSocialEngineeringSocialMediaScamsrestrictedThreatLandscapeaccountabilitySLAOWASPAccessControlPassword12characterscompromisepaymentgatewayInternalUsevulnerabilitydatabaseNetworksInformationSecurityBYODpaymentoptionSpearPhishingcriticalfilesdatasecuritydataTrojanRansomwareserver80/20Sensitive

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. Privacy
  2. security
  3. lockout
  4. confidential
  5. Cybersecurity Landscape
  6. Worm
  7. Pretexting
  8. digital data
  9. DPA
  10. MFA
  11. Application Security
  12. PII
  13. Threat
  14. information classification standards
  15. Audit
  16. backup
  17. Risk
  18. Procedures
  19. SDLC
  20. Phishing
  21. Breach
  22. server
  23. security awareness
  24. compliance
  25. Smishing
  26. Authentication
  27. Virus
  28. data privacy
  29. Authorization
  30. information systems
  31. Guidelines
  32. Access Control Policy
  33. GDPR
  34. Standards
  35. Scam
  36. cookies
  37. Vulnerability
  38. Vishing
  39. Policy
  40. Phishing
  41. Social Engineering
  42. Social Media Scams
  43. restricted
  44. Threat Landscape
  45. accountability
  46. SLA
  47. OWASP
  48. Access Control
  49. Password
  50. 12 characters
  51. compromise
  52. payment gateway
  53. Internal Use
  54. vulnerability
  55. database
  56. Networks
  57. Information Security
  58. BYOD
  59. payment option
  60. Spear Phishing
  61. critical files
  62. data security
  63. data
  64. Trojan
  65. Ransomware
  66. server
  67. 80/20
  68. Sensitive