SecurityAssertionMarkupLanguage(SAML)MalwareSecurityPolicySecureSocketLayer(SSL)DataEncryptionStandard(DES)AuthenticationInsiderThreatAuthorizationTransportLayerSecurity(TLS)NetworkSegmentationAccessLogsSecurityInformationand EventManagement(SIEM)IncidentResponseFirewallAccessControlBreachIntrusionDetectionFree!PatchManagementSOC2Multi-FactorAuthentication(MFA)ThreatIntelligencePhishingBiometricsRansomwareCyberHygienePenetrationTestingDenial-of-Service(DoS)SecureCodingBackupRiskAssessmentGDPRDigitalSignatureDataLeakPrivilegedAccessManagement(PAM)CompliancePatchFrameworkSocialEngineeringPublic KeyInfrastructure(PKI)SingleSign-On(SSO)Zero-DaySecurityAuditCyberAttackEndpointSecurityCertificateAuthorityITGovernanceDataPrivacySpywareIdentityTheftCloudSecurityInformationSecurityVirusRecoveryPlanTokenizationSecurityAwarenessSessionHijackingVulnerabilityData LossPrevention(DLP)TrojanEncryptionSecurityAssertionMarkupLanguage(SAML)MalwareSecurityPolicySecureSocketLayer(SSL)DataEncryptionStandard(DES)AuthenticationInsiderThreatAuthorizationTransportLayerSecurity(TLS)NetworkSegmentationAccessLogsSecurityInformationand EventManagement(SIEM)IncidentResponseFirewallAccessControlBreachIntrusionDetectionFree!PatchManagementSOC2Multi-FactorAuthentication(MFA)ThreatIntelligencePhishingBiometricsRansomwareCyberHygienePenetrationTestingDenial-of-Service(DoS)SecureCodingBackupRiskAssessmentGDPRDigitalSignatureDataLeakPrivilegedAccessManagement(PAM)CompliancePatchFrameworkSocialEngineeringPublic KeyInfrastructure(PKI)SingleSign-On(SSO)Zero-DaySecurityAuditCyberAttackEndpointSecurityCertificateAuthorityITGovernanceDataPrivacySpywareIdentityTheftCloudSecurityInformationSecurityVirusRecoveryPlanTokenizationSecurityAwarenessSessionHijackingVulnerabilityData LossPrevention(DLP)TrojanEncryption

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
  1. Security Assertion Markup Language (SAML)
  2. Malware
  3. Security Policy
  4. Secure Socket Layer (SSL)
  5. Data Encryption Standard (DES)
  6. Authentication
  7. Insider Threat
  8. Authorization
  9. Transport Layer Security (TLS)
  10. Network Segmentation
  11. Access Logs
  12. Security Information and Event Management (SIEM)
  13. Incident Response
  14. Firewall
  15. Access Control
  16. Breach
  17. Intrusion Detection
  18. Free!
  19. Patch Management
  20. SOC 2
  21. Multi-Factor Authentication (MFA)
  22. Threat Intelligence
  23. Phishing
  24. Biometrics
  25. Ransomware
  26. Cyber Hygiene
  27. Penetration Testing
  28. Denial-of-Service (DoS)
  29. Secure Coding
  30. Backup
  31. Risk Assessment
  32. GDPR
  33. Digital Signature
  34. Data Leak
  35. Privileged Access Management (PAM)
  36. Compliance
  37. Patch
  38. Framework
  39. Social Engineering
  40. Public Key Infrastructure (PKI)
  41. Single Sign-On (SSO)
  42. Zero-Day
  43. Security Audit
  44. Cyber Attack
  45. Endpoint Security
  46. Certificate Authority
  47. IT Governance
  48. Data Privacy
  49. Spyware
  50. Identity Theft
  51. Cloud Security
  52. Information Security
  53. Virus
  54. Recovery Plan
  55. Tokenization
  56. Security Awareness
  57. Session Hijacking
  58. Vulnerability
  59. Data Loss Prevention (DLP)
  60. Trojan
  61. Encryption