13.Breach12.Patch50. NetworkSegmentation25.Compliance21.DataPrivacy37.Biometrics35.DigitalSignature4.Firewall16.Zero-Day46.SecureCoding39.IdentityTheft3.Encryption30.RecoveryPlan23.IncidentResponse34.TransportLayerSecurity(TLS)36.SecurityAwareness26.SecurityPolicy45.CertificateAuthority38.CloudSecurity1.Authentication27.PenetrationTesting14.InsiderThreat17. Multi-FactorAuthentication(MFA)28.DataLeak31.Denial-of-Service(DoS)6.Phishing47.PhysicalSecurity33. SecureSocketLayer(SSL)29.Backup10.Virus44.Tokenization48. SecurityInformationand EventManagement(SIEM)43.SessionHijacking40. DataEncryptionStandard(DES)5.Malware11.Vulnerability2.Authorization8.Spyware9.Trojan19.EndpointSecurity24. RiskAssessment49.AccessLogs41. PublicKeyInfrastructure(PKI)18.AccessControl42.SecurityAudit7.Ransomware22. ThreatIntelligence20.CyberAttack32.IntrusionDetection15. SocialEngineering13.Breach12.Patch50. NetworkSegmentation25.Compliance21.DataPrivacy37.Biometrics35.DigitalSignature4.Firewall16.Zero-Day46.SecureCoding39.IdentityTheft3.Encryption30.RecoveryPlan23.IncidentResponse34.TransportLayerSecurity(TLS)36.SecurityAwareness26.SecurityPolicy45.CertificateAuthority38.CloudSecurity1.Authentication27.PenetrationTesting14.InsiderThreat17. Multi-FactorAuthentication(MFA)28.DataLeak31.Denial-of-Service(DoS)6.Phishing47.PhysicalSecurity33. SecureSocketLayer(SSL)29.Backup10.Virus44.Tokenization48. SecurityInformationand EventManagement(SIEM)43.SessionHijacking40. DataEncryptionStandard(DES)5.Malware11.Vulnerability2.Authorization8.Spyware9.Trojan19.EndpointSecurity24. RiskAssessment49.AccessLogs41. PublicKeyInfrastructure(PKI)18.AccessControl42.SecurityAudit7.Ransomware22. ThreatIntelligence20.CyberAttack32.IntrusionDetection15. SocialEngineering

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 13. Breach
  2. 12. Patch
  3. 50. Network Segmentation
  4. 25. Compliance
  5. 21. Data Privacy
  6. 37. Biometrics
  7. 35. Digital Signature
  8. 4. Firewall
  9. 16. Zero-Day
  10. 46. Secure Coding
  11. 39. Identity Theft
  12. 3. Encryption
  13. 30. Recovery Plan
  14. 23. Incident Response
  15. 34. Transport Layer Security (TLS)
  16. 36. Security Awareness
  17. 26. Security Policy
  18. 45. Certificate Authority
  19. 38. Cloud Security
  20. 1. Authentication
  21. 27. Penetration Testing
  22. 14. Insider Threat
  23. 17. Multi-Factor Authentication (MFA)
  24. 28. Data Leak
  25. 31. Denial-of-Service (DoS)
  26. 6. Phishing
  27. 47. Physical Security
  28. 33. Secure Socket Layer (SSL)
  29. 29. Backup
  30. 10. Virus
  31. 44. Tokenization
  32. 48. Security Information and Event Management (SIEM)
  33. 43. Session Hijacking
  34. 40. Data Encryption Standard (DES)
  35. 5. Malware
  36. 11. Vulnerability
  37. 2. Authorization
  38. 8. Spyware
  39. 9. Trojan
  40. 19. Endpoint Security
  41. 24. Risk Assessment
  42. 49. Access Logs
  43. 41. Public Key Infrastructure (PKI)
  44. 18. Access Control
  45. 42. Security Audit
  46. 7. Ransomware
  47. 22. Threat Intelligence
  48. 20. Cyber Attack
  49. 32. Intrusion Detection
  50. 15. Social Engineering