(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Has built their own firewall
Is double-majoring
Has contributed to open-source security projects
Can speak multiple languages
Completed a cybersecurity internship
Is a freshman
Uses multi-factor authentication on most accounts
Knows how to program in Python
Uses Linux as their main operating system
Has set up a home lab for cybersecurity
Reads cybersecurity news daily
Has attended a cybersecurity job fair
Attended a DEFCON or Black Hat conference
Is a non-STEM major
Has a pet at home
Has experienced a phishing attack
Plays an instrument
Has reverse-engineered malware
Has participated in a Capture the Flag (CTF) competition
Uses a password manager
Has a certification (e.g., CompTIA Security+, CISSP)