(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
22. Threat Intelligence
34. Transport Layer Security (TLS)
32. Intrusion Detection
14. Insider Threat
27. Penetration Testing
12. Patch
17. Multi-Factor Authentication (MFA)
16. Zero-Day
50. Network Segmentation
6. Phishing
38. Cloud Security
29. Backup
4. Firewall
26. Security Policy
5. Malware
8. Spyware
19. Endpoint Security
23. Incident Response
49. Access Logs
18. Access Control
13. Breach
35. Digital Signature
9. Trojan
30. Recovery Plan
40. Data Encryption Standard (DES)
15. Social Engineering
10. Virus
37. Biometrics
20. Cyber Attack
48. Security Information and Event Management (SIEM)