RPI Privacy Data Protection Malware Missing Encryption Disaster Recovery CSO AIP Spyware RMA SSL MFA ASPR Threat Actor Internet- Facing Quantum- Safe Algorithm Data Governance S- 0120 AES Passwords Ransomware SPI Quantum Computing DPI Cyberattack PII Passcodes Sensitive Data Inventory Firewall VPN Escalation IAMS Request PCI Decryption ITAP Encryption Table Azure SSE SSN TLS Intellectual Property CCRC Scorecard End-to- End Encryption Azure Key Vault Brute- Force Attack HIPAA Not Encrypted Data- at-Rest ITAP Cryptography Data Breach Encryption Services Team 256 Bit Hacker Super Fun Salting Symmetric Encryption SCD Private Key ASPR- Compliant Hash Encryption SecureData NIST Rainbow Table Attack Identity Theft Dark Web Key Rotation Data- In- Transit DOB Cybersecurity Authentication Credentials GDPR Encryption Keys Secure Man- in-the- Middle TDE PHI RPI Privacy Data Protection Malware Missing Encryption Disaster Recovery CSO AIP Spyware RMA SSL MFA ASPR Threat Actor Internet- Facing Quantum- Safe Algorithm Data Governance S- 0120 AES Passwords Ransomware SPI Quantum Computing DPI Cyberattack PII Passcodes Sensitive Data Inventory Firewall VPN Escalation IAMS Request PCI Decryption ITAP Encryption Table Azure SSE SSN TLS Intellectual Property CCRC Scorecard End-to- End Encryption Azure Key Vault Brute- Force Attack HIPAA Not Encrypted Data- at-Rest ITAP Cryptography Data Breach Encryption Services Team 256 Bit Hacker Super Fun Salting Symmetric Encryption SCD Private Key ASPR- Compliant Hash Encryption SecureData NIST Rainbow Table Attack Identity Theft Dark Web Key Rotation Data- In- Transit DOB Cybersecurity Authentication Credentials GDPR Encryption Keys Secure Man- in-the- Middle TDE PHI
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
RPI
Privacy
Data Protection
Malware
Missing Encryption
Disaster Recovery
CSO
AIP
Spyware
RMA
SSL
MFA
ASPR
Threat Actor
Internet-Facing
Quantum-Safe Algorithm
Data Governance
S-0120
AES
Passwords
Ransomware
SPI
Quantum Computing
DPI
Cyberattack
PII
Passcodes
Sensitive Data Inventory
Firewall
VPN
Escalation
IAMS Request
PCI
Decryption
ITAP Encryption Table
Azure SSE
SSN
TLS
Intellectual Property
CCRC Scorecard
End-to-End Encryption
Azure Key Vault
Brute-Force Attack
HIPAA
Not Encrypted
Data-at-Rest
ITAP
Cryptography
Data Breach
Encryption Services Team
256 Bit
Hacker
Super Fun
Salting
Symmetric Encryption
SCD
Private Key
ASPR-Compliant
Hash Encryption
SecureData
NIST
Rainbow Table Attack
Identity Theft
Dark Web
Key Rotation
Data-In-Transit
DOB
Cybersecurity
Authentication Credentials
GDPR
Encryption Keys
Secure
Man-in-the-Middle
TDE
PHI