ComplianceRemoteAccessBreachRiskAssessmentQuarantineAuditNon-ComplianceSecurityTrainingInformationSecurityAuthenticationSystemOwnersSystemsPolicyCompliancePhysicalSecurityPatchOperatingSystemApplicationHardeningPersonalDataClassificationChangeManagementPasswordsTransparencySensitiveDataISO27001AssetsCyberCertKeeperDataMaskingIntegrityRemoteAccessUser AccessManagementAccountabilityZero-TrustIncidentManagementRiskManagementChangeManagementConfidentialityDataRetentionComplianceMonitoringShreddersBenchmarkingDataBreachDataProtectionReportingCompanyPortalAppStagingEnvironmentsDataDictionaryDataStewardsAccessControlEssential8BackupDataSecurityThird-PartyVendorsNetworkSecurityIncidentReportingTrainingContinuousImprovementRestrictedAccessSecurityControlsVulnerabilityNISTMulti-FactorAuthenticationSupplierSecurityHubSpotCyberSecurityLeastPrivilegeProceduresPrivacyUserTrainingArtificialIntelligenceSecurityAwarenessSecurityIncidentVendor RiskManagementRolesEncryptionMonitoringUnauthorizedAccessHSQFScreenConnectControlOwnersAccessControlPolicyRequestSystemGuidelinesIncidentResponseComplianceRemoteAccessBreachRiskAssessmentQuarantineAuditNon-ComplianceSecurityTrainingInformationSecurityAuthenticationSystemOwnersSystemsPolicyCompliancePhysicalSecurityPatchOperatingSystemApplicationHardeningPersonalDataClassificationChangeManagementPasswordsTransparencySensitiveDataISO27001AssetsCyberCertKeeperDataMaskingIntegrityRemoteAccessUser AccessManagementAccountabilityZero-TrustIncidentManagementRiskManagementChangeManagementConfidentialityDataRetentionComplianceMonitoringShreddersBenchmarkingDataBreachDataProtectionReportingCompanyPortalAppStagingEnvironmentsDataDictionaryDataStewardsAccessControlEssential8BackupDataSecurityThird-PartyVendorsNetworkSecurityIncidentReportingTrainingContinuousImprovementRestrictedAccessSecurityControlsVulnerabilityNISTMulti-FactorAuthenticationSupplierSecurityHubSpotCyberSecurityLeastPrivilegeProceduresPrivacyUserTrainingArtificialIntelligenceSecurityAwarenessSecurityIncidentVendor RiskManagementRolesEncryptionMonitoringUnauthorizedAccessHSQFScreenConnectControlOwnersAccessControlPolicyRequestSystemGuidelinesIncidentResponse

Technology Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Compliance
  2. Remote Access
  3. Breach
  4. Risk Assessment
  5. Quarantine
  6. Audit
  7. Non-Compliance
  8. Security Training
  9. Information Security
  10. Authentication
  11. System Owners
  12. Systems
  13. Policy Compliance
  14. Physical Security
  15. Patch Operating System
  16. Application Hardening
  17. Personal Data
  18. Classification
  19. Change Management
  20. Passwords
  21. Transparency
  22. Sensitive Data
  23. ISO27001
  24. Assets
  25. CyberCert
  26. Keeper
  27. Data Masking
  28. Integrity
  29. Remote Access
  30. User Access Management
  31. Accountability
  32. Zero-Trust
  33. Incident Management
  34. Risk Management
  35. Change Management
  36. Confidentiality
  37. Data Retention
  38. Compliance Monitoring
  39. Shredders
  40. Benchmarking
  41. Data Breach
  42. Data Protection
  43. Reporting
  44. Company Portal App
  45. Staging Environments
  46. Data Dictionary
  47. Data Stewards
  48. Access Control
  49. Essential 8
  50. Backup
  51. Data Security
  52. Third-Party Vendors
  53. Network Security
  54. Incident Reporting
  55. Training
  56. Continuous Improvement
  57. Restricted Access
  58. Security Controls
  59. Vulnerability
  60. NIST
  61. Multi-Factor Authentication
  62. Supplier Security
  63. HubSpot
  64. Cyber Security
  65. Least Privilege
  66. Procedures
  67. Privacy
  68. User Training
  69. Artificial Intelligence
  70. Security Awareness
  71. Security Incident
  72. Vendor Risk Management
  73. Roles
  74. Encryption
  75. Monitoring
  76. Unauthorized Access
  77. HSQF
  78. ScreenConnect
  79. Control Owners
  80. Access Control Policy
  81. Request System Guidelines
  82. Incident Response