SecurityAuditIdentityTheftCybersecurityMalwareSecureCommunicationThreatMitigationIncidentReportingVisitorPolicyThird-PartyRisksPrivacySettingsInsiderThreatRemoteWorkEncryptionPersonalSecurityDataLossFirewallAuthenticationRiskDataBreachNeed-to-KnowCriticalInformationCountermeasuresAnalysisDigitalFootprintSecurityBreachSecurityClearanceControlMeasuresHere’s a list of75 OPSEC-related wordsand phrases touse for yourbingo game:SecurityPolicyDataEncryptionTailgatingMulti-layerSecurityBehavioralPatternsLaptopSecurityCloudSecuritySurveillanceOversharingMonitoringInformationLifecycleTwo-FactorAuthenticationRedFlagsAdversaryPhysicalSecurityUSBRisksConfidentialitySecureDisposalEmailPhishingThreatAssessmentClassifiedAccessControlSituationalAwarenessPasswordHygieneOPSECCycleSpywarePublicWi-FiAccessLogsSecurityCultureOperationalPlanHybridScheduleAwarenessNetworkSecurityThird-PartyAccessUnauthorizedAccessComplianceSocialMediaBestPracticesSensitiveInformationVulnerabilityBadgeSecuritySocialEngineeringIndicatorTrainingInformationSharingZeroTrustWorkstationLockingDocumentSecuritySecurityAuditIdentityTheftCybersecurityMalwareSecureCommunicationThreatMitigationIncidentReportingVisitorPolicyThird-PartyRisksPrivacySettingsInsiderThreatRemoteWorkEncryptionPersonalSecurityDataLossFirewallAuthenticationRiskDataBreachNeed-to-KnowCriticalInformationCountermeasuresAnalysisDigitalFootprintSecurityBreachSecurityClearanceControlMeasuresHere’s a list of75 OPSEC-related wordsand phrases touse for yourbingo game:SecurityPolicyDataEncryptionTailgatingMulti-layerSecurityBehavioralPatternsLaptopSecurityCloudSecuritySurveillanceOversharingMonitoringInformationLifecycleTwo-FactorAuthenticationRedFlagsAdversaryPhysicalSecurityUSBRisksConfidentialitySecureDisposalEmailPhishingThreatAssessmentClassifiedAccessControlSituationalAwarenessPasswordHygieneOPSECCycleSpywarePublicWi-FiAccessLogsSecurityCultureOperationalPlanHybridScheduleAwarenessNetworkSecurityThird-PartyAccessUnauthorizedAccessComplianceSocialMediaBestPracticesSensitiveInformationVulnerabilityBadgeSecuritySocialEngineeringIndicatorTrainingInformationSharingZeroTrustWorkstationLockingDocumentSecurity

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
B
3
N
4
O
5
O
6
I
7
N
8
O
9
I
10
G
11
N
12
B
13
B
14
I
15
G
16
I
17
I
18
I
19
O
20
I
21
O
22
N
23
N
24
G
25
G
26
O
27
G
28
B
29
O
30
B
31
I
32
B
33
I
34
O
35
I
36
B
37
O
38
O
39
N
40
N
41
N
42
G
43
I
44
N
45
G
46
N
47
G
48
B
49
B
50
G
51
O
52
O
53
I
54
O
55
N
56
B
57
G
58
N
59
I
60
N
61
G
62
O
63
G
64
B
65
B
66
B
67
G
68
I
69
G
70
B
71
N
72
I
73
O
74
G
75
B
76
B
  1. N-Security Audit
  2. B-Identity Theft
  3. N-Cybersecurity
  4. O-Malware
  5. O-Secure Communication
  6. I-Threat Mitigation
  7. N-Incident Reporting
  8. O-Visitor Policy
  9. I-Third-Party Risks
  10. G-Privacy Settings
  11. N-Insider Threat
  12. B-Remote Work
  13. B-Encryption
  14. I-Personal Security
  15. G-Data Loss
  16. I-Firewall
  17. I-Authentication
  18. I-Risk
  19. O-Data Breach
  20. I-Need-to-Know
  21. O-Critical Information
  22. N-Countermeasures
  23. N-Analysis
  24. G-Digital Footprint
  25. G-Security Breach
  26. O-Security Clearance
  27. G-Control Measures
  28. B-Here’s a list of 75 OPSEC-related words and phrases to use for your bingo game:
  29. O-Security Policy
  30. B-Data Encryption
  31. I-Tailgating
  32. B-Multi-layer Security
  33. I-Behavioral Patterns
  34. O-Laptop Security
  35. I-Cloud Security
  36. B-Surveillance
  37. O-Oversharing
  38. O-Monitoring
  39. N-Information Lifecycle
  40. N-Two-Factor Authentication
  41. N-Red Flags
  42. G-Adversary
  43. I-Physical Security
  44. N-USB Risks
  45. G-Confidentiality
  46. N-Secure Disposal
  47. G-Email Phishing
  48. B-Threat Assessment
  49. B-Classified
  50. G-Access Control
  51. O-Situational Awareness
  52. O-Password Hygiene
  53. I-OPSEC Cycle
  54. O-Spyware
  55. N-Public Wi-Fi
  56. B-Access Logs
  57. G-Security Culture
  58. N-Operational Plan
  59. I-Hybrid Schedule
  60. N-Awareness
  61. G-Network Security
  62. O-Third-Party Access
  63. G-Unauthorized Access
  64. B-Compliance
  65. B-Social Media
  66. B-Best Practices
  67. G-Sensitive Information
  68. I-Vulnerability
  69. G-Badge Security
  70. B-Social Engineering
  71. N-Indicator
  72. I-Training
  73. O-Information Sharing
  74. G-Zero Trust
  75. B-Workstation Locking
  76. B-Document Security