34.TransportLayerSecurity(TLS)6.Phishing3.Encryption14.InsiderThreat37.Biometrics9.Trojan47.PhysicalSecurity16.Zero-Day36.SecurityAwareness41. PublicKeyInfrastructure(PKI)10.Virus18.AccessControl5.Malware40. DataEncryptionStandard(DES)45.CertificateAuthority32.IntrusionDetection22. ThreatIntelligence49.AccessLogs38.CloudSecurity26.SecurityPolicy15. SocialEngineering31.Denial-of-Service(DoS)4.Firewall23.IncidentResponse43.SessionHijacking7.Ransomware27.PenetrationTesting12.Patch42.SecurityAudit33. SecureSocketLayer(SSL)29.Backup30.RecoveryPlan28.DataLeak2.Authorization25.Compliance21.DataPrivacy50. NetworkSegmentation1.Authentication46.SecureCoding13.Breach35.DigitalSignature8.Spyware44.Tokenization20.CyberAttack39.IdentityTheft24. RiskAssessment17. Multi-FactorAuthentication(MFA)11.Vulnerability48. SecurityInformationand EventManagement(SIEM)19.EndpointSecurity34.TransportLayerSecurity(TLS)6.Phishing3.Encryption14.InsiderThreat37.Biometrics9.Trojan47.PhysicalSecurity16.Zero-Day36.SecurityAwareness41. PublicKeyInfrastructure(PKI)10.Virus18.AccessControl5.Malware40. DataEncryptionStandard(DES)45.CertificateAuthority32.IntrusionDetection22. ThreatIntelligence49.AccessLogs38.CloudSecurity26.SecurityPolicy15. SocialEngineering31.Denial-of-Service(DoS)4.Firewall23.IncidentResponse43.SessionHijacking7.Ransomware27.PenetrationTesting12.Patch42.SecurityAudit33. SecureSocketLayer(SSL)29.Backup30.RecoveryPlan28.DataLeak2.Authorization25.Compliance21.DataPrivacy50. NetworkSegmentation1.Authentication46.SecureCoding13.Breach35.DigitalSignature8.Spyware44.Tokenization20.CyberAttack39.IdentityTheft24. RiskAssessment17. Multi-FactorAuthentication(MFA)11.Vulnerability48. SecurityInformationand EventManagement(SIEM)19.EndpointSecurity

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 34. Transport Layer Security (TLS)
  2. 6. Phishing
  3. 3. Encryption
  4. 14. Insider Threat
  5. 37. Biometrics
  6. 9. Trojan
  7. 47. Physical Security
  8. 16. Zero-Day
  9. 36. Security Awareness
  10. 41. Public Key Infrastructure (PKI)
  11. 10. Virus
  12. 18. Access Control
  13. 5. Malware
  14. 40. Data Encryption Standard (DES)
  15. 45. Certificate Authority
  16. 32. Intrusion Detection
  17. 22. Threat Intelligence
  18. 49. Access Logs
  19. 38. Cloud Security
  20. 26. Security Policy
  21. 15. Social Engineering
  22. 31. Denial-of-Service (DoS)
  23. 4. Firewall
  24. 23. Incident Response
  25. 43. Session Hijacking
  26. 7. Ransomware
  27. 27. Penetration Testing
  28. 12. Patch
  29. 42. Security Audit
  30. 33. Secure Socket Layer (SSL)
  31. 29. Backup
  32. 30. Recovery Plan
  33. 28. Data Leak
  34. 2. Authorization
  35. 25. Compliance
  36. 21. Data Privacy
  37. 50. Network Segmentation
  38. 1. Authentication
  39. 46. Secure Coding
  40. 13. Breach
  41. 35. Digital Signature
  42. 8. Spyware
  43. 44. Tokenization
  44. 20. Cyber Attack
  45. 39. Identity Theft
  46. 24. Risk Assessment
  47. 17. Multi-Factor Authentication (MFA)
  48. 11. Vulnerability
  49. 48. Security Information and Event Management (SIEM)
  50. 19. Endpoint Security