(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
43. Session Hijacking
2. Authorization
6. Phishing
15. Social Engineering
46. Secure Coding
42. Security Audit
44. Tokenization
22. Threat Intelligence
37. Biometrics
49. Access Logs
5. Malware
39. Identity Theft
20. Cyber Attack
17. Multi-Factor Authentication (MFA)
7. Ransomware
41. Public Key Infrastructure (PKI)
1. Authentication
23. Incident Response
9. Trojan
21. Data Privacy
14. Insider Threat
8. Spyware
45. Certificate Authority
12. Patch
35. Digital Signature
24. Risk Assessment
11. Vulnerability
31. Denial-of-Service (DoS)
32. Intrusion Detection
18. Access Control
48. Security Information and Event Management (SIEM)