SurveillanceSecurityBreachEmailPhishingControlMeasuresPublicWi-FiPersonalSecurityThreatAssessmentBadgeSecurityComplianceCriticalInformationInformationLifecycleAccessControlNetworkSecuritySecureDisposalAwarenessSecurityAuditDigitalFootprintDataBreachThird-PartyAccessHere’s a list of75 OPSEC-related wordsand phrases touse for yourbingo game:HybridSchedulePrivacySettingsSituationalAwarenessMalwareTrainingSocialMediaOversharingZeroTrustAccessLogsThreatMitigationSecurityCultureClassifiedRedFlagsSpywareDataLossBestPracticesCloudSecurityVulnerabilityUnauthorizedAccessTailgatingIdentityTheftEncryptionUSBRisksIndicatorTwo-FactorAuthenticationVisitorPolicyInformationSharingSocialEngineeringOperationalPlanNeed-to-KnowOPSECCycleDocumentSecuritySensitiveInformationSecureCommunicationLaptopSecuritySecurityPolicyIncidentReportingMulti-layerSecurityInsiderThreatWorkstationLockingBehavioralPatternsAnalysisAdversaryAuthenticationRemoteWorkFirewallThird-PartyRisksConfidentialitySecurityClearanceCountermeasuresPhysicalSecurityDataEncryptionPasswordHygieneMonitoringCybersecurityRiskSurveillanceSecurityBreachEmailPhishingControlMeasuresPublicWi-FiPersonalSecurityThreatAssessmentBadgeSecurityComplianceCriticalInformationInformationLifecycleAccessControlNetworkSecuritySecureDisposalAwarenessSecurityAuditDigitalFootprintDataBreachThird-PartyAccessHere’s a list of75 OPSEC-related wordsand phrases touse for yourbingo game:HybridSchedulePrivacySettingsSituationalAwarenessMalwareTrainingSocialMediaOversharingZeroTrustAccessLogsThreatMitigationSecurityCultureClassifiedRedFlagsSpywareDataLossBestPracticesCloudSecurityVulnerabilityUnauthorizedAccessTailgatingIdentityTheftEncryptionUSBRisksIndicatorTwo-FactorAuthenticationVisitorPolicyInformationSharingSocialEngineeringOperationalPlanNeed-to-KnowOPSECCycleDocumentSecuritySensitiveInformationSecureCommunicationLaptopSecuritySecurityPolicyIncidentReportingMulti-layerSecurityInsiderThreatWorkstationLockingBehavioralPatternsAnalysisAdversaryAuthenticationRemoteWorkFirewallThird-PartyRisksConfidentialitySecurityClearanceCountermeasuresPhysicalSecurityDataEncryptionPasswordHygieneMonitoringCybersecurityRisk

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
G
3
G
4
G
5
N
6
I
7
B
8
G
9
B
10
O
11
N
12
G
13
G
14
N
15
N
16
N
17
G
18
O
19
O
20
B
21
I
22
G
23
O
24
O
25
I
26
B
27
O
28
G
29
B
30
I
31
G
32
B
33
N
34
O
35
G
36
B
37
I
38
I
39
G
40
I
41
B
42
B
43
N
44
N
45
N
46
O
47
O
48
B
49
N
50
I
51
I
52
B
53
G
54
O
55
O
56
O
57
N
58
B
59
N
60
B
61
I
62
N
63
G
64
I
65
B
66
I
67
I
68
G
69
O
70
N
71
I
72
B
73
O
74
O
75
N
76
I
  1. B-Surveillance
  2. G-Security Breach
  3. G-Email Phishing
  4. G-Control Measures
  5. N-Public Wi-Fi
  6. I-Personal Security
  7. B-Threat Assessment
  8. G-Badge Security
  9. B-Compliance
  10. O-Critical Information
  11. N-Information Lifecycle
  12. G-Access Control
  13. G-Network Security
  14. N-Secure Disposal
  15. N-Awareness
  16. N-Security Audit
  17. G-Digital Footprint
  18. O-Data Breach
  19. O-Third-Party Access
  20. B-Here’s a list of 75 OPSEC-related words and phrases to use for your bingo game:
  21. I-Hybrid Schedule
  22. G-Privacy Settings
  23. O-Situational Awareness
  24. O-Malware
  25. I-Training
  26. B-Social Media
  27. O-Oversharing
  28. G-Zero Trust
  29. B-Access Logs
  30. I-Threat Mitigation
  31. G-Security Culture
  32. B-Classified
  33. N-Red Flags
  34. O-Spyware
  35. G-Data Loss
  36. B-Best Practices
  37. I-Cloud Security
  38. I-Vulnerability
  39. G-Unauthorized Access
  40. I-Tailgating
  41. B-Identity Theft
  42. B-Encryption
  43. N-USB Risks
  44. N-Indicator
  45. N-Two-Factor Authentication
  46. O-Visitor Policy
  47. O-Information Sharing
  48. B-Social Engineering
  49. N-Operational Plan
  50. I-Need-to-Know
  51. I-OPSEC Cycle
  52. B-Document Security
  53. G-Sensitive Information
  54. O-Secure Communication
  55. O-Laptop Security
  56. O-Security Policy
  57. N-Incident Reporting
  58. B-Multi-layer Security
  59. N-Insider Threat
  60. B-Workstation Locking
  61. I-Behavioral Patterns
  62. N-Analysis
  63. G-Adversary
  64. I-Authentication
  65. B-Remote Work
  66. I-Firewall
  67. I-Third-Party Risks
  68. G-Confidentiality
  69. O-Security Clearance
  70. N-Countermeasures
  71. I-Physical Security
  72. B-Data Encryption
  73. O-Password Hygiene
  74. O-Monitoring
  75. N-Cybersecurity
  76. I-Risk