(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
41. Public Key Infrastructure (PKI)
27. Penetration Testing
5. Malware
13. Breach
31. Denial-of-Service (DoS)
24. Risk Assessment
20. Cyber Attack
29. Backup
34. Transport Layer Security (TLS)
40. Data Encryption Standard (DES)
38. Cloud Security
3. Encryption
17. Multi-Factor Authentication (MFA)
30. Recovery Plan
43. Session Hijacking
25. Compliance
46. Secure Coding
11. Vulnerability
50. Network Segmentation
32. Intrusion Detection
12. Patch
44. Tokenization
48. Security Information and Event Management (SIEM)