ReportingQuarantineAccountabilityStagingEnvironmentsEncryptionHSQFAuditChangeManagementMulti-FactorAuthenticationUnauthorizedAccessAccessControlProceduresBenchmarkingIncidentReportingUserTrainingIncidentResponseThird-PartyVendorsSystemsIntegrityKeeperScreenConnectRemoteAccessDataDictionarySupplierSecurityClassificationRemoteAccessShreddersComplianceContinuousImprovementLeastPrivilegeConfidentialityDataBreachDataProtectionSecurityControlsCompanyPortalAppPrivacyDataRetentionDataStewardsApplicationHardeningAssetsDataSecurityIncidentManagementRolesMonitoringAccessControlPolicyHubSpotSystemOwnersInformationSecurityPersonalDataSecurityAwarenessVulnerabilityEssential8RiskManagementBreachNon-CompliancePhysicalSecurityNetworkSecurityZero-TrustSecurityIncidentCyberCertTrainingChangeManagementTransparencyISO27001User AccessManagementAuthenticationSensitiveDataVendor RiskManagementComplianceMonitoringSecurityTrainingNISTRestrictedAccessBackupCyberSecurityControlOwnersPatchOperatingSystemPolicyComplianceArtificialIntelligencePasswordsRiskAssessmentRequestSystemGuidelinesDataMaskingReportingQuarantineAccountabilityStagingEnvironmentsEncryptionHSQFAuditChangeManagementMulti-FactorAuthenticationUnauthorizedAccessAccessControlProceduresBenchmarkingIncidentReportingUserTrainingIncidentResponseThird-PartyVendorsSystemsIntegrityKeeperScreenConnectRemoteAccessDataDictionarySupplierSecurityClassificationRemoteAccessShreddersComplianceContinuousImprovementLeastPrivilegeConfidentialityDataBreachDataProtectionSecurityControlsCompanyPortalAppPrivacyDataRetentionDataStewardsApplicationHardeningAssetsDataSecurityIncidentManagementRolesMonitoringAccessControlPolicyHubSpotSystemOwnersInformationSecurityPersonalDataSecurityAwarenessVulnerabilityEssential8RiskManagementBreachNon-CompliancePhysicalSecurityNetworkSecurityZero-TrustSecurityIncidentCyberCertTrainingChangeManagementTransparencyISO27001User AccessManagementAuthenticationSensitiveDataVendor RiskManagementComplianceMonitoringSecurityTrainingNISTRestrictedAccessBackupCyberSecurityControlOwnersPatchOperatingSystemPolicyComplianceArtificialIntelligencePasswordsRiskAssessmentRequestSystemGuidelinesDataMasking

Technology Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Reporting
  2. Quarantine
  3. Accountability
  4. Staging Environments
  5. Encryption
  6. HSQF
  7. Audit
  8. Change Management
  9. Multi-Factor Authentication
  10. Unauthorized Access
  11. Access Control
  12. Procedures
  13. Benchmarking
  14. Incident Reporting
  15. User Training
  16. Incident Response
  17. Third-Party Vendors
  18. Systems
  19. Integrity
  20. Keeper
  21. ScreenConnect
  22. Remote Access
  23. Data Dictionary
  24. Supplier Security
  25. Classification
  26. Remote Access
  27. Shredders
  28. Compliance
  29. Continuous Improvement
  30. Least Privilege
  31. Confidentiality
  32. Data Breach
  33. Data Protection
  34. Security Controls
  35. Company Portal App
  36. Privacy
  37. Data Retention
  38. Data Stewards
  39. Application Hardening
  40. Assets
  41. Data Security
  42. Incident Management
  43. Roles
  44. Monitoring
  45. Access Control Policy
  46. HubSpot
  47. System Owners
  48. Information Security
  49. Personal Data
  50. Security Awareness
  51. Vulnerability
  52. Essential 8
  53. Risk Management
  54. Breach
  55. Non-Compliance
  56. Physical Security
  57. Network Security
  58. Zero-Trust
  59. Security Incident
  60. CyberCert
  61. Training
  62. Change Management
  63. Transparency
  64. ISO27001
  65. User Access Management
  66. Authentication
  67. Sensitive Data
  68. Vendor Risk Management
  69. Compliance Monitoring
  70. Security Training
  71. NIST
  72. Restricted Access
  73. Backup
  74. Cyber Security
  75. Control Owners
  76. Patch Operating System
  77. Policy Compliance
  78. Artificial Intelligence
  79. Passwords
  80. Risk Assessment
  81. Request System Guidelines
  82. Data Masking