(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
13. Breach
16. Zero-Day
41. Public Key Infrastructure (PKI)
44. Tokenization
3. Encryption
30. Recovery Plan
18. Access Control
33. Secure Socket Layer (SSL)
45. Certificate Authority
4. Firewall
29. Backup
46. Secure Coding
24. Risk Assessment
1. Authentication
25. Compliance
17. Multi-Factor Authentication (MFA)
28. Data Leak
21. Data Privacy
14. Insider Threat
37. Biometrics
43. Session Hijacking
36. Security Awareness
49. Access Logs
48. Security Information and Event Management (SIEM)