AuthenticationDataDictionaryThird-PartyVendorsPolicyComplianceAccessControlReportingRiskManagementCyberSecurityNon-ComplianceChangeManagementISO27001HSQFPhysicalSecurityLeastPrivilegeDataSecurityEssential8ApplicationHardeningComplianceMonitoringBackupRestrictedAccessConfidentialityTransparencyRiskAssessmentUserTrainingSecurityAwarenessZero-TrustRemoteAccessAccessControlPolicyPrivacyStagingEnvironmentsVendor RiskManagementTrainingSystemOwnersRequestSystemGuidelinesSecurityControlsSecurityTrainingHubSpotPasswordsNISTUnauthorizedAccessNetworkSecurityMulti-FactorAuthenticationBreachRemoteAccessProceduresIntegrityContinuousImprovementEncryptionAccountabilityControlOwnersSystemsSensitiveDataIncidentManagementArtificialIntelligenceDataBreachBenchmarkingPersonalDataComplianceSecurityIncidentCyberCertPatchOperatingSystemAssetsInformationSecurityUser AccessManagementIncidentReportingClassificationIncidentResponseDataMaskingQuarantineCompanyPortalAppDataProtectionDataStewardsDataRetentionKeeperMonitoringScreenConnectAuditShreddersSupplierSecurityVulnerabilityRolesChangeManagementAuthenticationDataDictionaryThird-PartyVendorsPolicyComplianceAccessControlReportingRiskManagementCyberSecurityNon-ComplianceChangeManagementISO27001HSQFPhysicalSecurityLeastPrivilegeDataSecurityEssential8ApplicationHardeningComplianceMonitoringBackupRestrictedAccessConfidentialityTransparencyRiskAssessmentUserTrainingSecurityAwarenessZero-TrustRemoteAccessAccessControlPolicyPrivacyStagingEnvironmentsVendor RiskManagementTrainingSystemOwnersRequestSystemGuidelinesSecurityControlsSecurityTrainingHubSpotPasswordsNISTUnauthorizedAccessNetworkSecurityMulti-FactorAuthenticationBreachRemoteAccessProceduresIntegrityContinuousImprovementEncryptionAccountabilityControlOwnersSystemsSensitiveDataIncidentManagementArtificialIntelligenceDataBreachBenchmarkingPersonalDataComplianceSecurityIncidentCyberCertPatchOperatingSystemAssetsInformationSecurityUser AccessManagementIncidentReportingClassificationIncidentResponseDataMaskingQuarantineCompanyPortalAppDataProtectionDataStewardsDataRetentionKeeperMonitoringScreenConnectAuditShreddersSupplierSecurityVulnerabilityRolesChangeManagement

Technology Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Authentication
  2. Data Dictionary
  3. Third-Party Vendors
  4. Policy Compliance
  5. Access Control
  6. Reporting
  7. Risk Management
  8. Cyber Security
  9. Non-Compliance
  10. Change Management
  11. ISO27001
  12. HSQF
  13. Physical Security
  14. Least Privilege
  15. Data Security
  16. Essential 8
  17. Application Hardening
  18. Compliance Monitoring
  19. Backup
  20. Restricted Access
  21. Confidentiality
  22. Transparency
  23. Risk Assessment
  24. User Training
  25. Security Awareness
  26. Zero-Trust
  27. Remote Access
  28. Access Control Policy
  29. Privacy
  30. Staging Environments
  31. Vendor Risk Management
  32. Training
  33. System Owners
  34. Request System Guidelines
  35. Security Controls
  36. Security Training
  37. HubSpot
  38. Passwords
  39. NIST
  40. Unauthorized Access
  41. Network Security
  42. Multi-Factor Authentication
  43. Breach
  44. Remote Access
  45. Procedures
  46. Integrity
  47. Continuous Improvement
  48. Encryption
  49. Accountability
  50. Control Owners
  51. Systems
  52. Sensitive Data
  53. Incident Management
  54. Artificial Intelligence
  55. Data Breach
  56. Benchmarking
  57. Personal Data
  58. Compliance
  59. Security Incident
  60. CyberCert
  61. Patch Operating System
  62. Assets
  63. Information Security
  64. User Access Management
  65. Incident Reporting
  66. Classification
  67. Incident Response
  68. Data Masking
  69. Quarantine
  70. Company Portal App
  71. Data Protection
  72. Data Stewards
  73. Data Retention
  74. Keeper
  75. Monitoring
  76. ScreenConnect
  77. Audit
  78. Shredders
  79. Supplier Security
  80. Vulnerability
  81. Roles
  82. Change Management