Threat Intelligence Endpoint Security Encryption Transport Layer Security (TLS) Security Audit Network Segmentation Security Information and Event Management (SIEM) Phishing Zero- Day Secure Socket Layer (SSL) Vulnerability Denial-of- Service (DoS) Data Leak Spyware Recovery Plan Session Hijacking Social Engineering Insider Threat Public Key Infrastructure (PKI) Authentication Firewall Identity Theft Tokenization Breach Risk Assessment Certificate of Destruction Security Policy Ransomware Compliance Biometrics Cloud Security Authorization Backup Digital Signature Malware Cyber Attack Incident Response Access Control Data Privacy Virus Trojan Multi-Factor Authentication (MFA) Intrusion Detection Patch Secure Coding Data Encryption Standard (DES) Information Security Security Awareness Penetration Testing Access Logs Threat Intelligence Endpoint Security Encryption Transport Layer Security (TLS) Security Audit Network Segmentation Security Information and Event Management (SIEM) Phishing Zero- Day Secure Socket Layer (SSL) Vulnerability Denial-of- Service (DoS) Data Leak Spyware Recovery Plan Session Hijacking Social Engineering Insider Threat Public Key Infrastructure (PKI) Authentication Firewall Identity Theft Tokenization Breach Risk Assessment Certificate of Destruction Security Policy Ransomware Compliance Biometrics Cloud Security Authorization Backup Digital Signature Malware Cyber Attack Incident Response Access Control Data Privacy Virus Trojan Multi-Factor Authentication (MFA) Intrusion Detection Patch Secure Coding Data Encryption Standard (DES) Information Security Security Awareness Penetration Testing Access Logs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Intelligence
Endpoint Security
Encryption
Transport Layer Security (TLS)
Security Audit
Network Segmentation
Security Information and Event Management (SIEM)
Phishing
Zero-Day
Secure Socket Layer (SSL)
Vulnerability
Denial-of-Service (DoS)
Data Leak
Spyware
Recovery Plan
Session Hijacking
Social Engineering
Insider Threat
Public Key Infrastructure (PKI)
Authentication
Firewall
Identity Theft
Tokenization
Breach
Risk Assessment
Certificate of Destruction
Security Policy
Ransomware
Compliance
Biometrics
Cloud Security
Authorization
Backup
Digital Signature
Malware
Cyber Attack
Incident Response
Access Control
Data Privacy
Virus
Trojan
Multi-Factor Authentication (MFA)
Intrusion Detection
Patch
Secure Coding
Data Encryption Standard (DES)
Information Security
Security Awareness
Penetration Testing
Access Logs