CyberCertPrivacyDataBreachRestrictedAccessEssential8IncidentResponseSystemsDataSecuritySecurityTrainingSupplierSecurityInformationSecurityAccessControlContinuousImprovementQuarantineRiskAssessmentMonitoringDataProtectionShreddersDataDictionaryRemoteAccessAssetsComplianceMonitoringPatchOperatingSystemDataRetentionSecurityAwarenessSecurityControlsRolesControlOwnersTrainingAccountabilityConfidentialityUser AccessManagementProceduresSecurityIncidentVulnerabilityCyberSecurityApplicationHardeningMulti-FactorAuthenticationEncryptionAccessControlPolicyBenchmarkingReportingClassificationArtificialIntelligenceKeeperUserTrainingNISTRemoteAccessRiskManagementCompanyPortalAppZero-TrustDataStewardsTransparencySystemOwnersRequestSystemGuidelinesBreachChangeManagementPhysicalSecurityPolicyComplianceNon-ComplianceScreenConnectUnauthorizedAccessLeastPrivilegeStagingEnvironmentsThird-PartyVendorsHubSpotPasswordsAuditIncidentManagementISO27001IncidentReportingIntegrityDataMaskingNetworkSecurityComplianceBackupHSQFPersonalDataSensitiveDataVendor RiskManagementAuthenticationChangeManagementCyberCertPrivacyDataBreachRestrictedAccessEssential8IncidentResponseSystemsDataSecuritySecurityTrainingSupplierSecurityInformationSecurityAccessControlContinuousImprovementQuarantineRiskAssessmentMonitoringDataProtectionShreddersDataDictionaryRemoteAccessAssetsComplianceMonitoringPatchOperatingSystemDataRetentionSecurityAwarenessSecurityControlsRolesControlOwnersTrainingAccountabilityConfidentialityUser AccessManagementProceduresSecurityIncidentVulnerabilityCyberSecurityApplicationHardeningMulti-FactorAuthenticationEncryptionAccessControlPolicyBenchmarkingReportingClassificationArtificialIntelligenceKeeperUserTrainingNISTRemoteAccessRiskManagementCompanyPortalAppZero-TrustDataStewardsTransparencySystemOwnersRequestSystemGuidelinesBreachChangeManagementPhysicalSecurityPolicyComplianceNon-ComplianceScreenConnectUnauthorizedAccessLeastPrivilegeStagingEnvironmentsThird-PartyVendorsHubSpotPasswordsAuditIncidentManagementISO27001IncidentReportingIntegrityDataMaskingNetworkSecurityComplianceBackupHSQFPersonalDataSensitiveDataVendor RiskManagementAuthenticationChangeManagement

Technology Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. CyberCert
  2. Privacy
  3. Data Breach
  4. Restricted Access
  5. Essential 8
  6. Incident Response
  7. Systems
  8. Data Security
  9. Security Training
  10. Supplier Security
  11. Information Security
  12. Access Control
  13. Continuous Improvement
  14. Quarantine
  15. Risk Assessment
  16. Monitoring
  17. Data Protection
  18. Shredders
  19. Data Dictionary
  20. Remote Access
  21. Assets
  22. Compliance Monitoring
  23. Patch Operating System
  24. Data Retention
  25. Security Awareness
  26. Security Controls
  27. Roles
  28. Control Owners
  29. Training
  30. Accountability
  31. Confidentiality
  32. User Access Management
  33. Procedures
  34. Security Incident
  35. Vulnerability
  36. Cyber Security
  37. Application Hardening
  38. Multi-Factor Authentication
  39. Encryption
  40. Access Control Policy
  41. Benchmarking
  42. Reporting
  43. Classification
  44. Artificial Intelligence
  45. Keeper
  46. User Training
  47. NIST
  48. Remote Access
  49. Risk Management
  50. Company Portal App
  51. Zero-Trust
  52. Data Stewards
  53. Transparency
  54. System Owners
  55. Request System Guidelines
  56. Breach
  57. Change Management
  58. Physical Security
  59. Policy Compliance
  60. Non-Compliance
  61. ScreenConnect
  62. Unauthorized Access
  63. Least Privilege
  64. Staging Environments
  65. Third-Party Vendors
  66. HubSpot
  67. Passwords
  68. Audit
  69. Incident Management
  70. ISO27001
  71. Incident Reporting
  72. Integrity
  73. Data Masking
  74. Network Security
  75. Compliance
  76. Backup
  77. HSQF
  78. Personal Data
  79. Sensitive Data
  80. Vendor Risk Management
  81. Authentication
  82. Change Management