RiskManagementConfidentialityDataProtectionRequestSystemGuidelinesShreddersAccountabilityComplianceTrainingDataDictionaryAuditDataRetentionSecurityAwarenessBenchmarkingKeeperRestrictedAccessEssential8UnauthorizedAccessPrivacyPersonalDataRemoteAccessTransparencyInformationSecurityApplicationHardeningAccessControlPolicyComplianceMonitoringNISTUserTrainingVendor RiskManagementPhysicalSecurityControlOwnersChangeManagementHubSpotSystemOwnersIncidentManagementIntegrityQuarantineAssetsHSQFLeastPrivilegeNon-ComplianceSecurityIncidentSecurityTrainingEncryptionISO27001ChangeManagementRemoteAccessCyberCertSupplierSecuritySystemsAuthenticationMonitoringSensitiveDataVulnerabilityBackupDataStewardsProceduresReportingNetworkSecurityDataSecurityUser AccessManagementZero-TrustPolicyComplianceStagingEnvironmentsSecurityControlsContinuousImprovementIncidentResponseCompanyPortalAppDataMaskingPatchOperatingSystemIncidentReportingBreachScreenConnectRiskAssessmentArtificialIntelligenceThird-PartyVendorsCyberSecurityRolesAccessControlClassificationMulti-FactorAuthenticationDataBreachPasswordsRiskManagementConfidentialityDataProtectionRequestSystemGuidelinesShreddersAccountabilityComplianceTrainingDataDictionaryAuditDataRetentionSecurityAwarenessBenchmarkingKeeperRestrictedAccessEssential8UnauthorizedAccessPrivacyPersonalDataRemoteAccessTransparencyInformationSecurityApplicationHardeningAccessControlPolicyComplianceMonitoringNISTUserTrainingVendor RiskManagementPhysicalSecurityControlOwnersChangeManagementHubSpotSystemOwnersIncidentManagementIntegrityQuarantineAssetsHSQFLeastPrivilegeNon-ComplianceSecurityIncidentSecurityTrainingEncryptionISO27001ChangeManagementRemoteAccessCyberCertSupplierSecuritySystemsAuthenticationMonitoringSensitiveDataVulnerabilityBackupDataStewardsProceduresReportingNetworkSecurityDataSecurityUser AccessManagementZero-TrustPolicyComplianceStagingEnvironmentsSecurityControlsContinuousImprovementIncidentResponseCompanyPortalAppDataMaskingPatchOperatingSystemIncidentReportingBreachScreenConnectRiskAssessmentArtificialIntelligenceThird-PartyVendorsCyberSecurityRolesAccessControlClassificationMulti-FactorAuthenticationDataBreachPasswords

Technology Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Risk Management
  2. Confidentiality
  3. Data Protection
  4. Request System Guidelines
  5. Shredders
  6. Accountability
  7. Compliance
  8. Training
  9. Data Dictionary
  10. Audit
  11. Data Retention
  12. Security Awareness
  13. Benchmarking
  14. Keeper
  15. Restricted Access
  16. Essential 8
  17. Unauthorized Access
  18. Privacy
  19. Personal Data
  20. Remote Access
  21. Transparency
  22. Information Security
  23. Application Hardening
  24. Access Control Policy
  25. Compliance Monitoring
  26. NIST
  27. User Training
  28. Vendor Risk Management
  29. Physical Security
  30. Control Owners
  31. Change Management
  32. HubSpot
  33. System Owners
  34. Incident Management
  35. Integrity
  36. Quarantine
  37. Assets
  38. HSQF
  39. Least Privilege
  40. Non-Compliance
  41. Security Incident
  42. Security Training
  43. Encryption
  44. ISO27001
  45. Change Management
  46. Remote Access
  47. CyberCert
  48. Supplier Security
  49. Systems
  50. Authentication
  51. Monitoring
  52. Sensitive Data
  53. Vulnerability
  54. Backup
  55. Data Stewards
  56. Procedures
  57. Reporting
  58. Network Security
  59. Data Security
  60. User Access Management
  61. Zero-Trust
  62. Policy Compliance
  63. Staging Environments
  64. Security Controls
  65. Continuous Improvement
  66. Incident Response
  67. Company Portal App
  68. Data Masking
  69. Patch Operating System
  70. Incident Reporting
  71. Breach
  72. ScreenConnect
  73. Risk Assessment
  74. Artificial Intelligence
  75. Third-Party Vendors
  76. Cyber Security
  77. Roles
  78. Access Control
  79. Classification
  80. Multi-Factor Authentication
  81. Data Breach
  82. Passwords