43.SessionHijacking2.Authorization6.Phishing15. SocialEngineering46.SecureCoding42.SecurityAudit44.Tokenization22. ThreatIntelligence37.Biometrics49.AccessLogs5.Malware39.IdentityTheft20.CyberAttack17. Multi-FactorAuthentication(MFA)7.Ransomware41. PublicKeyInfrastructure(PKI)1.Authentication23.IncidentResponse9.Trojan21.DataPrivacy14.InsiderThreat8.Spyware45.CertificateAuthority12.Patch35.DigitalSignature24. RiskAssessment11.Vulnerability31.Denial-of-Service(DoS)32.IntrusionDetection18.AccessControl48. SecurityInformationand EventManagement(SIEM)47.PhysicalSecurity25.Compliance34.TransportLayerSecurity(TLS)29.Backup38.CloudSecurity36.SecurityAwareness10.Virus16.Zero-Day19.EndpointSecurity30.RecoveryPlan13.Breach4.Firewall28.DataLeak27.PenetrationTesting40. DataEncryptionStandard(DES)50. NetworkSegmentation3.Encryption33. SecureSocketLayer(SSL)26.SecurityPolicy43.SessionHijacking2.Authorization6.Phishing15. SocialEngineering46.SecureCoding42.SecurityAudit44.Tokenization22. ThreatIntelligence37.Biometrics49.AccessLogs5.Malware39.IdentityTheft20.CyberAttack17. Multi-FactorAuthentication(MFA)7.Ransomware41. PublicKeyInfrastructure(PKI)1.Authentication23.IncidentResponse9.Trojan21.DataPrivacy14.InsiderThreat8.Spyware45.CertificateAuthority12.Patch35.DigitalSignature24. RiskAssessment11.Vulnerability31.Denial-of-Service(DoS)32.IntrusionDetection18.AccessControl48. SecurityInformationand EventManagement(SIEM)47.PhysicalSecurity25.Compliance34.TransportLayerSecurity(TLS)29.Backup38.CloudSecurity36.SecurityAwareness10.Virus16.Zero-Day19.EndpointSecurity30.RecoveryPlan13.Breach4.Firewall28.DataLeak27.PenetrationTesting40. DataEncryptionStandard(DES)50. NetworkSegmentation3.Encryption33. SecureSocketLayer(SSL)26.SecurityPolicy

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 43. Session Hijacking
  2. 2. Authorization
  3. 6. Phishing
  4. 15. Social Engineering
  5. 46. Secure Coding
  6. 42. Security Audit
  7. 44. Tokenization
  8. 22. Threat Intelligence
  9. 37. Biometrics
  10. 49. Access Logs
  11. 5. Malware
  12. 39. Identity Theft
  13. 20. Cyber Attack
  14. 17. Multi-Factor Authentication (MFA)
  15. 7. Ransomware
  16. 41. Public Key Infrastructure (PKI)
  17. 1. Authentication
  18. 23. Incident Response
  19. 9. Trojan
  20. 21. Data Privacy
  21. 14. Insider Threat
  22. 8. Spyware
  23. 45. Certificate Authority
  24. 12. Patch
  25. 35. Digital Signature
  26. 24. Risk Assessment
  27. 11. Vulnerability
  28. 31. Denial-of-Service (DoS)
  29. 32. Intrusion Detection
  30. 18. Access Control
  31. 48. Security Information and Event Management (SIEM)
  32. 47. Physical Security
  33. 25. Compliance
  34. 34. Transport Layer Security (TLS)
  35. 29. Backup
  36. 38. Cloud Security
  37. 36. Security Awareness
  38. 10. Virus
  39. 16. Zero-Day
  40. 19. Endpoint Security
  41. 30. Recovery Plan
  42. 13. Breach
  43. 4. Firewall
  44. 28. Data Leak
  45. 27. Penetration Testing
  46. 40. Data Encryption Standard (DES)
  47. 50. Network Segmentation
  48. 3. Encryption
  49. 33. Secure Socket Layer (SSL)
  50. 26. Security Policy