UserTrainingRiskAssessmentEncryptionDataBreachNetworkSecurityRemoteAccessCyberCertUnauthorizedAccessVendor RiskManagementPersonalDataComplianceEssential8Zero-TrustIncidentReportingChangeManagementConfidentialityIncidentManagementSecurityControlsNISTDataMaskingHubSpotPolicyComplianceCyberSecuritySensitiveDataSecurityAwarenessDataRetentionInformationSecurityLeastPrivilegeRolesAssetsSupplierSecurityUser AccessManagementRiskManagementReportingClassificationAccountabilityControlOwnersSecurityIncidentTransparencyDataProtectionDataDictionarySystemsPasswordsMonitoringPatchOperatingSystemProceduresAccessControlPolicyQuarantineKeeperDataStewardsAuthenticationTrainingBreachComplianceMonitoringIntegrityNon-ComplianceBenchmarkingChangeManagementHSQFRequestSystemGuidelinesCompanyPortalAppApplicationHardeningScreenConnectISO27001AuditPhysicalSecurityPrivacyShreddersSystemOwnersMulti-FactorAuthenticationStagingEnvironmentsThird-PartyVendorsArtificialIntelligenceIncidentResponseDataSecurityRestrictedAccessRemoteAccessContinuousImprovementBackupVulnerabilitySecurityTrainingAccessControlUserTrainingRiskAssessmentEncryptionDataBreachNetworkSecurityRemoteAccessCyberCertUnauthorizedAccessVendor RiskManagementPersonalDataComplianceEssential8Zero-TrustIncidentReportingChangeManagementConfidentialityIncidentManagementSecurityControlsNISTDataMaskingHubSpotPolicyComplianceCyberSecuritySensitiveDataSecurityAwarenessDataRetentionInformationSecurityLeastPrivilegeRolesAssetsSupplierSecurityUser AccessManagementRiskManagementReportingClassificationAccountabilityControlOwnersSecurityIncidentTransparencyDataProtectionDataDictionarySystemsPasswordsMonitoringPatchOperatingSystemProceduresAccessControlPolicyQuarantineKeeperDataStewardsAuthenticationTrainingBreachComplianceMonitoringIntegrityNon-ComplianceBenchmarkingChangeManagementHSQFRequestSystemGuidelinesCompanyPortalAppApplicationHardeningScreenConnectISO27001AuditPhysicalSecurityPrivacyShreddersSystemOwnersMulti-FactorAuthenticationStagingEnvironmentsThird-PartyVendorsArtificialIntelligenceIncidentResponseDataSecurityRestrictedAccessRemoteAccessContinuousImprovementBackupVulnerabilitySecurityTrainingAccessControl

Technology Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. User Training
  2. Risk Assessment
  3. Encryption
  4. Data Breach
  5. Network Security
  6. Remote Access
  7. CyberCert
  8. Unauthorized Access
  9. Vendor Risk Management
  10. Personal Data
  11. Compliance
  12. Essential 8
  13. Zero-Trust
  14. Incident Reporting
  15. Change Management
  16. Confidentiality
  17. Incident Management
  18. Security Controls
  19. NIST
  20. Data Masking
  21. HubSpot
  22. Policy Compliance
  23. Cyber Security
  24. Sensitive Data
  25. Security Awareness
  26. Data Retention
  27. Information Security
  28. Least Privilege
  29. Roles
  30. Assets
  31. Supplier Security
  32. User Access Management
  33. Risk Management
  34. Reporting
  35. Classification
  36. Accountability
  37. Control Owners
  38. Security Incident
  39. Transparency
  40. Data Protection
  41. Data Dictionary
  42. Systems
  43. Passwords
  44. Monitoring
  45. Patch Operating System
  46. Procedures
  47. Access Control Policy
  48. Quarantine
  49. Keeper
  50. Data Stewards
  51. Authentication
  52. Training
  53. Breach
  54. Compliance Monitoring
  55. Integrity
  56. Non-Compliance
  57. Benchmarking
  58. Change Management
  59. HSQF
  60. Request System Guidelines
  61. Company Portal App
  62. Application Hardening
  63. ScreenConnect
  64. ISO27001
  65. Audit
  66. Physical Security
  67. Privacy
  68. Shredders
  69. System Owners
  70. Multi-Factor Authentication
  71. Staging Environments
  72. Third-Party Vendors
  73. Artificial Intelligence
  74. Incident Response
  75. Data Security
  76. Restricted Access
  77. Remote Access
  78. Continuous Improvement
  79. Backup
  80. Vulnerability
  81. Security Training
  82. Access Control