22. ThreatIntelligence34.TransportLayerSecurity(TLS)32.IntrusionDetection14.InsiderThreat27.PenetrationTesting12.Patch17. Multi-FactorAuthentication(MFA)16.Zero-Day50. NetworkSegmentation6.Phishing38.CloudSecurity29.Backup4.Firewall26.SecurityPolicy5.Malware8.Spyware19.EndpointSecurity23.IncidentResponse49.AccessLogs18.AccessControl13.Breach35.DigitalSignature9.Trojan30.RecoveryPlan40. DataEncryptionStandard(DES)15. SocialEngineering10.Virus37.Biometrics20.CyberAttack48. SecurityInformationand EventManagement(SIEM)1.Authentication3.Encryption25.Compliance45.CertificateAuthority44.Tokenization36.SecurityAwareness28.DataLeak2.Authorization33. SecureSocketLayer(SSL)47.PhysicalSecurity11.Vulnerability21.DataPrivacy46.SecureCoding24. RiskAssessment7.Ransomware31.Denial-of-Service(DoS)42.SecurityAudit39.IdentityTheft41. PublicKeyInfrastructure(PKI)43.SessionHijacking22. ThreatIntelligence34.TransportLayerSecurity(TLS)32.IntrusionDetection14.InsiderThreat27.PenetrationTesting12.Patch17. Multi-FactorAuthentication(MFA)16.Zero-Day50. NetworkSegmentation6.Phishing38.CloudSecurity29.Backup4.Firewall26.SecurityPolicy5.Malware8.Spyware19.EndpointSecurity23.IncidentResponse49.AccessLogs18.AccessControl13.Breach35.DigitalSignature9.Trojan30.RecoveryPlan40. DataEncryptionStandard(DES)15. SocialEngineering10.Virus37.Biometrics20.CyberAttack48. SecurityInformationand EventManagement(SIEM)1.Authentication3.Encryption25.Compliance45.CertificateAuthority44.Tokenization36.SecurityAwareness28.DataLeak2.Authorization33. SecureSocketLayer(SSL)47.PhysicalSecurity11.Vulnerability21.DataPrivacy46.SecureCoding24. RiskAssessment7.Ransomware31.Denial-of-Service(DoS)42.SecurityAudit39.IdentityTheft41. PublicKeyInfrastructure(PKI)43.SessionHijacking

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 22. Threat Intelligence
  2. 34. Transport Layer Security (TLS)
  3. 32. Intrusion Detection
  4. 14. Insider Threat
  5. 27. Penetration Testing
  6. 12. Patch
  7. 17. Multi-Factor Authentication (MFA)
  8. 16. Zero-Day
  9. 50. Network Segmentation
  10. 6. Phishing
  11. 38. Cloud Security
  12. 29. Backup
  13. 4. Firewall
  14. 26. Security Policy
  15. 5. Malware
  16. 8. Spyware
  17. 19. Endpoint Security
  18. 23. Incident Response
  19. 49. Access Logs
  20. 18. Access Control
  21. 13. Breach
  22. 35. Digital Signature
  23. 9. Trojan
  24. 30. Recovery Plan
  25. 40. Data Encryption Standard (DES)
  26. 15. Social Engineering
  27. 10. Virus
  28. 37. Biometrics
  29. 20. Cyber Attack
  30. 48. Security Information and Event Management (SIEM)
  31. 1. Authentication
  32. 3. Encryption
  33. 25. Compliance
  34. 45. Certificate Authority
  35. 44. Tokenization
  36. 36. Security Awareness
  37. 28. Data Leak
  38. 2. Authorization
  39. 33. Secure Socket Layer (SSL)
  40. 47. Physical Security
  41. 11. Vulnerability
  42. 21. Data Privacy
  43. 46. Secure Coding
  44. 24. Risk Assessment
  45. 7. Ransomware
  46. 31. Denial-of-Service (DoS)
  47. 42. Security Audit
  48. 39. Identity Theft
  49. 41. Public Key Infrastructure (PKI)
  50. 43. Session Hijacking