6. Phishing 32. Intrusion Detection 5. Malware 4. Firewall 34. Transport Layer Security (TLS) 1. Authentication 2. Authorization 20. Cyber Attack 16. Zero- Day 45. Certificate Authority 14. Insider Threat 26. Security Policy 48. Security Information and Event Management (SIEM) 42. Security Audit 44. Tokenization 27. Penetration Testing 41. Public Key Infrastructure (PKI) 8. Spyware 33. Secure Socket Layer (SSL) 24. Risk Assessment 38. Cloud Security 28. Data Leak 30. Recovery Plan 50. Network Segmentation 17. Multi- Factor Authentication (MFA) 15. Social Engineering 36. Security Awareness 10. Virus 25. Compliance 39. Identity Theft 18. Access Control 3. Encryption 37. Biometrics 9. Trojan 49. Access Logs 11. Vulnerability 7. Ransomware 31. Denial-of- Service (DoS) 13. Breach 19. Endpoint Security 21. Data Privacy 23. Incident Response 22. Threat Intelligence 35. Digital Signature 12. Patch 47. Physical Security 29. Backup 43. Session Hijacking 46. Secure Coding 40. Data Encryption Standard (DES) 6. Phishing 32. Intrusion Detection 5. Malware 4. Firewall 34. Transport Layer Security (TLS) 1. Authentication 2. Authorization 20. Cyber Attack 16. Zero- Day 45. Certificate Authority 14. Insider Threat 26. Security Policy 48. Security Information and Event Management (SIEM) 42. Security Audit 44. Tokenization 27. Penetration Testing 41. Public Key Infrastructure (PKI) 8. Spyware 33. Secure Socket Layer (SSL) 24. Risk Assessment 38. Cloud Security 28. Data Leak 30. Recovery Plan 50. Network Segmentation 17. Multi- Factor Authentication (MFA) 15. Social Engineering 36. Security Awareness 10. Virus 25. Compliance 39. Identity Theft 18. Access Control 3. Encryption 37. Biometrics 9. Trojan 49. Access Logs 11. Vulnerability 7. Ransomware 31. Denial-of- Service (DoS) 13. Breach 19. Endpoint Security 21. Data Privacy 23. Incident Response 22. Threat Intelligence 35. Digital Signature 12. Patch 47. Physical Security 29. Backup 43. Session Hijacking 46. Secure Coding 40. Data Encryption Standard (DES)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
6. Phishing
32. Intrusion Detection
5. Malware
4. Firewall
34. Transport Layer Security (TLS)
1. Authentication
2. Authorization
20. Cyber Attack
16. Zero-Day
45. Certificate Authority
14. Insider Threat
26. Security Policy
48. Security Information and Event Management (SIEM)
42. Security Audit
44. Tokenization
27. Penetration Testing
41. Public Key Infrastructure (PKI)
8. Spyware
33. Secure Socket Layer (SSL)
24. Risk Assessment
38. Cloud Security
28. Data Leak
30. Recovery Plan
50. Network Segmentation
17. Multi-Factor Authentication (MFA)
15. Social Engineering
36. Security Awareness
10. Virus
25. Compliance
39. Identity Theft
18. Access Control
3. Encryption
37. Biometrics
9. Trojan
49. Access Logs
11. Vulnerability
7. Ransomware
31. Denial-of-Service (DoS)
13. Breach
19. Endpoint Security
21. Data Privacy
23. Incident Response
22. Threat Intelligence
35. Digital Signature
12. Patch
47. Physical Security
29. Backup
43. Session Hijacking
46. Secure Coding
40. Data Encryption Standard (DES)