13.Breach16.Zero-Day41. PublicKeyInfrastructure(PKI)44.Tokenization3.Encryption30.RecoveryPlan18.AccessControl33. SecureSocketLayer(SSL)45.CertificateAuthority4.Firewall29.Backup46.SecureCoding24. RiskAssessment1.Authentication25.Compliance17. Multi-FactorAuthentication(MFA)28.DataLeak21.DataPrivacy14.InsiderThreat37.Biometrics43.SessionHijacking36.SecurityAwareness49.AccessLogs48. SecurityInformationand EventManagement(SIEM)50. NetworkSegmentation15. SocialEngineering31.Denial-of-Service(DoS)38.CloudSecurity7.Ransomware11.Vulnerability9.Trojan32.IntrusionDetection40. DataEncryptionStandard(DES)2.Authorization39.IdentityTheft35.DigitalSignature5.Malware8.Spyware27.PenetrationTesting26.SecurityPolicy20.CyberAttack6.Phishing34.TransportLayerSecurity(TLS)42.SecurityAudit22. ThreatIntelligence10.Virus19.EndpointSecurity12.Patch47.PhysicalSecurity23.IncidentResponse13.Breach16.Zero-Day41. PublicKeyInfrastructure(PKI)44.Tokenization3.Encryption30.RecoveryPlan18.AccessControl33. SecureSocketLayer(SSL)45.CertificateAuthority4.Firewall29.Backup46.SecureCoding24. RiskAssessment1.Authentication25.Compliance17. Multi-FactorAuthentication(MFA)28.DataLeak21.DataPrivacy14.InsiderThreat37.Biometrics43.SessionHijacking36.SecurityAwareness49.AccessLogs48. SecurityInformationand EventManagement(SIEM)50. NetworkSegmentation15. SocialEngineering31.Denial-of-Service(DoS)38.CloudSecurity7.Ransomware11.Vulnerability9.Trojan32.IntrusionDetection40. DataEncryptionStandard(DES)2.Authorization39.IdentityTheft35.DigitalSignature5.Malware8.Spyware27.PenetrationTesting26.SecurityPolicy20.CyberAttack6.Phishing34.TransportLayerSecurity(TLS)42.SecurityAudit22. ThreatIntelligence10.Virus19.EndpointSecurity12.Patch47.PhysicalSecurity23.IncidentResponse

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 13. Breach
  2. 16. Zero-Day
  3. 41. Public Key Infrastructure (PKI)
  4. 44. Tokenization
  5. 3. Encryption
  6. 30. Recovery Plan
  7. 18. Access Control
  8. 33. Secure Socket Layer (SSL)
  9. 45. Certificate Authority
  10. 4. Firewall
  11. 29. Backup
  12. 46. Secure Coding
  13. 24. Risk Assessment
  14. 1. Authentication
  15. 25. Compliance
  16. 17. Multi-Factor Authentication (MFA)
  17. 28. Data Leak
  18. 21. Data Privacy
  19. 14. Insider Threat
  20. 37. Biometrics
  21. 43. Session Hijacking
  22. 36. Security Awareness
  23. 49. Access Logs
  24. 48. Security Information and Event Management (SIEM)
  25. 50. Network Segmentation
  26. 15. Social Engineering
  27. 31. Denial-of-Service (DoS)
  28. 38. Cloud Security
  29. 7. Ransomware
  30. 11. Vulnerability
  31. 9. Trojan
  32. 32. Intrusion Detection
  33. 40. Data Encryption Standard (DES)
  34. 2. Authorization
  35. 39. Identity Theft
  36. 35. Digital Signature
  37. 5. Malware
  38. 8. Spyware
  39. 27. Penetration Testing
  40. 26. Security Policy
  41. 20. Cyber Attack
  42. 6. Phishing
  43. 34. Transport Layer Security (TLS)
  44. 42. Security Audit
  45. 22. Threat Intelligence
  46. 10. Virus
  47. 19. Endpoint Security
  48. 12. Patch
  49. 47. Physical Security
  50. 23. Incident Response