StagingEnvironmentsCompanyPortalAppPolicyComplianceIncidentManagementRolesDataStewardsSecurityControlsRemoteAccessSupplierSecurityCompliancePhysicalSecurityAccessControlPolicyAccountabilityInformationSecurityRequestSystemGuidelinesDataSecurityChangeManagementAccessControlPasswordsPersonalDataProceduresTransparencyIncidentReportingAuditIncidentResponseComplianceMonitoringScreenConnectMonitoringDataBreachIntegrityControlOwnersSystemOwnersUserTrainingApplicationHardeningClassificationTrainingSecurityTrainingBackupShreddersCyberCertNetworkSecurityArtificialIntelligenceRiskManagementISO27001ConfidentialityRiskAssessmentLeastPrivilegeNISTSecurityIncidentDataRetentionThird-PartyVendorsAssetsPatchOperatingSystemDataProtectionChangeManagementAuthenticationNon-ComplianceDataMaskingVulnerabilityUnauthorizedAccessSensitiveDataBreachQuarantineZero-TrustPrivacyRemoteAccessMulti-FactorAuthenticationContinuousImprovementSecurityAwarenessSystemsHSQFVendor RiskManagementHubSpotReportingDataDictionaryBenchmarkingEncryptionUser AccessManagementCyberSecurityEssential8KeeperRestrictedAccessStagingEnvironmentsCompanyPortalAppPolicyComplianceIncidentManagementRolesDataStewardsSecurityControlsRemoteAccessSupplierSecurityCompliancePhysicalSecurityAccessControlPolicyAccountabilityInformationSecurityRequestSystemGuidelinesDataSecurityChangeManagementAccessControlPasswordsPersonalDataProceduresTransparencyIncidentReportingAuditIncidentResponseComplianceMonitoringScreenConnectMonitoringDataBreachIntegrityControlOwnersSystemOwnersUserTrainingApplicationHardeningClassificationTrainingSecurityTrainingBackupShreddersCyberCertNetworkSecurityArtificialIntelligenceRiskManagementISO27001ConfidentialityRiskAssessmentLeastPrivilegeNISTSecurityIncidentDataRetentionThird-PartyVendorsAssetsPatchOperatingSystemDataProtectionChangeManagementAuthenticationNon-ComplianceDataMaskingVulnerabilityUnauthorizedAccessSensitiveDataBreachQuarantineZero-TrustPrivacyRemoteAccessMulti-FactorAuthenticationContinuousImprovementSecurityAwarenessSystemsHSQFVendor RiskManagementHubSpotReportingDataDictionaryBenchmarkingEncryptionUser AccessManagementCyberSecurityEssential8KeeperRestrictedAccess

Technology Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Staging Environments
  2. Company Portal App
  3. Policy Compliance
  4. Incident Management
  5. Roles
  6. Data Stewards
  7. Security Controls
  8. Remote Access
  9. Supplier Security
  10. Compliance
  11. Physical Security
  12. Access Control Policy
  13. Accountability
  14. Information Security
  15. Request System Guidelines
  16. Data Security
  17. Change Management
  18. Access Control
  19. Passwords
  20. Personal Data
  21. Procedures
  22. Transparency
  23. Incident Reporting
  24. Audit
  25. Incident Response
  26. Compliance Monitoring
  27. ScreenConnect
  28. Monitoring
  29. Data Breach
  30. Integrity
  31. Control Owners
  32. System Owners
  33. User Training
  34. Application Hardening
  35. Classification
  36. Training
  37. Security Training
  38. Backup
  39. Shredders
  40. CyberCert
  41. Network Security
  42. Artificial Intelligence
  43. Risk Management
  44. ISO27001
  45. Confidentiality
  46. Risk Assessment
  47. Least Privilege
  48. NIST
  49. Security Incident
  50. Data Retention
  51. Third-Party Vendors
  52. Assets
  53. Patch Operating System
  54. Data Protection
  55. Change Management
  56. Authentication
  57. Non-Compliance
  58. Data Masking
  59. Vulnerability
  60. Unauthorized Access
  61. Sensitive Data
  62. Breach
  63. Quarantine
  64. Zero-Trust
  65. Privacy
  66. Remote Access
  67. Multi-Factor Authentication
  68. Continuous Improvement
  69. Security Awareness
  70. Systems
  71. HSQF
  72. Vendor Risk Management
  73. HubSpot
  74. Reporting
  75. Data Dictionary
  76. Benchmarking
  77. Encryption
  78. User Access Management
  79. Cyber Security
  80. Essential 8
  81. Keeper
  82. Restricted Access