(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
13. Breach
12. Patch
50. Network Segmentation
25. Compliance
21. Data Privacy
37. Biometrics
35. Digital Signature
4. Firewall
16. Zero-Day
46. Secure Coding
39. Identity Theft
3. Encryption
30. Recovery Plan
23. Incident Response
34. Transport Layer Security (TLS)
36. Security Awareness
26. Security Policy
45. Certificate Authority
38. Cloud Security
1. Authentication
27. Penetration Testing
14. Insider Threat
17. Multi-Factor Authentication (MFA)
28. Data Leak
31. Denial-of-Service (DoS)
6. Phishing
47. Physical Security
33. Secure Socket Layer (SSL)
29. Backup
10. Virus
44. Tokenization
48. Security Information and Event Management (SIEM)