Security Assertion Markup Language (SAML) Malware Security Policy Secure Socket Layer (SSL) Data Encryption Standard (DES) Authentication Insider Threat Authorization Transport Layer Security (TLS) Network Segmentation Access Logs Security Information and Event Management (SIEM) Incident Response Firewall Access Control Breach Intrusion Detection Free! Patch Management SOC 2 Multi-Factor Authentication (MFA) Threat Intelligence Phishing Biometrics Ransomware Cyber Hygiene Penetration Testing Denial-of- Service (DoS) Secure Coding Backup Risk Assessment GDPR Digital Signature Data Leak Privileged Access Management (PAM) Compliance Patch Framework Social Engineering Public Key Infrastructure (PKI) Single Sign-On (SSO) Zero- Day Security Audit Cyber Attack Endpoint Security Certificate Authority IT Governance Data Privacy Spyware Identity Theft Cloud Security Information Security Virus Recovery Plan Tokenization Security Awareness Session Hijacking Vulnerability Data Loss Prevention (DLP) Trojan Encryption Security Assertion Markup Language (SAML) Malware Security Policy Secure Socket Layer (SSL) Data Encryption Standard (DES) Authentication Insider Threat Authorization Transport Layer Security (TLS) Network Segmentation Access Logs Security Information and Event Management (SIEM) Incident Response Firewall Access Control Breach Intrusion Detection Free! Patch Management SOC 2 Multi-Factor Authentication (MFA) Threat Intelligence Phishing Biometrics Ransomware Cyber Hygiene Penetration Testing Denial-of- Service (DoS) Secure Coding Backup Risk Assessment GDPR Digital Signature Data Leak Privileged Access Management (PAM) Compliance Patch Framework Social Engineering Public Key Infrastructure (PKI) Single Sign-On (SSO) Zero- Day Security Audit Cyber Attack Endpoint Security Certificate Authority IT Governance Data Privacy Spyware Identity Theft Cloud Security Information Security Virus Recovery Plan Tokenization Security Awareness Session Hijacking Vulnerability Data Loss Prevention (DLP) Trojan Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security Assertion Markup Language (SAML)
Malware
Security Policy
Secure Socket Layer (SSL)
Data Encryption Standard (DES)
Authentication
Insider Threat
Authorization
Transport Layer Security (TLS)
Network Segmentation
Access Logs
Security Information and Event Management (SIEM)
Incident Response
Firewall
Access Control
Breach
Intrusion Detection
Free!
Patch Management
SOC 2
Multi-Factor Authentication (MFA)
Threat Intelligence
Phishing
Biometrics
Ransomware
Cyber Hygiene
Penetration Testing
Denial-of-Service (DoS)
Secure Coding
Backup
Risk Assessment
GDPR
Digital Signature
Data Leak
Privileged Access Management (PAM)
Compliance
Patch
Framework
Social Engineering
Public Key Infrastructure (PKI)
Single Sign-On (SSO)
Zero-Day
Security Audit
Cyber Attack
Endpoint Security
Certificate Authority
IT Governance
Data Privacy
Spyware
Identity Theft
Cloud Security
Information Security
Virus
Recovery Plan
Tokenization
Security Awareness
Session Hijacking
Vulnerability
Data Loss Prevention (DLP)
Trojan
Encryption