USBRisksSecurityAuditMonitoringBestPracticesConfidentialityControlMeasuresDataEncryptionIncidentReportingSensitiveInformationSocialMediaWorkstationLockingAwarenessOperationalPlanAuthenticationDocumentSecuritySecurityClearanceInformationSharingTwo-FactorAuthenticationCybersecurityDigitalFootprintThreatAssessmentUnauthorizedAccessHere’s a list of75 OPSEC-related wordsand phrases touse for yourbingo game:RedFlagsSecurityCulturePersonalSecurityLaptopSecurityRemoteWorkVulnerabilityNeed-to-KnowEncryptionBadgeSecurityCloudSecurityDataLossVisitorPolicyCriticalInformationRiskOPSECCycleFirewallPublicWi-FiClassifiedThird-PartyAccessSurveillanceTrainingSecureCommunicationAccessControlThreatMitigationComplianceThird-PartyRisksHybridScheduleDataBreachSecurityPolicyCountermeasuresIndicatorPasswordHygieneIdentityTheftSecurityBreachAdversaryPhysicalSecurityEmailPhishingInsiderThreatOversharingAccessLogsPrivacySettingsZeroTrustSituationalAwarenessMulti-layerSecurityAnalysisSocialEngineeringTailgatingSpywareSecureDisposalMalwareBehavioralPatternsInformationLifecycleNetworkSecurityUSBRisksSecurityAuditMonitoringBestPracticesConfidentialityControlMeasuresDataEncryptionIncidentReportingSensitiveInformationSocialMediaWorkstationLockingAwarenessOperationalPlanAuthenticationDocumentSecuritySecurityClearanceInformationSharingTwo-FactorAuthenticationCybersecurityDigitalFootprintThreatAssessmentUnauthorizedAccessHere’s a list of75 OPSEC-related wordsand phrases touse for yourbingo game:RedFlagsSecurityCulturePersonalSecurityLaptopSecurityRemoteWorkVulnerabilityNeed-to-KnowEncryptionBadgeSecurityCloudSecurityDataLossVisitorPolicyCriticalInformationRiskOPSECCycleFirewallPublicWi-FiClassifiedThird-PartyAccessSurveillanceTrainingSecureCommunicationAccessControlThreatMitigationComplianceThird-PartyRisksHybridScheduleDataBreachSecurityPolicyCountermeasuresIndicatorPasswordHygieneIdentityTheftSecurityBreachAdversaryPhysicalSecurityEmailPhishingInsiderThreatOversharingAccessLogsPrivacySettingsZeroTrustSituationalAwarenessMulti-layerSecurityAnalysisSocialEngineeringTailgatingSpywareSecureDisposalMalwareBehavioralPatternsInformationLifecycleNetworkSecurity

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
N
3
O
4
B
5
G
6
G
7
B
8
N
9
G
10
B
11
B
12
N
13
N
14
I
15
B
16
O
17
O
18
N
19
N
20
G
21
B
22
G
23
B
24
N
25
G
26
I
27
O
28
B
29
I
30
I
31
B
32
G
33
I
34
G
35
O
36
O
37
I
38
I
39
I
40
N
41
B
42
O
43
B
44
I
45
O
46
G
47
I
48
B
49
I
50
I
51
O
52
O
53
N
54
N
55
O
56
B
57
G
58
G
59
I
60
G
61
N
62
O
63
B
64
G
65
G
66
O
67
B
68
N
69
B
70
I
71
O
72
N
73
O
74
I
75
N
76
G
  1. N-USB Risks
  2. N-Security Audit
  3. O-Monitoring
  4. B-Best Practices
  5. G-Confidentiality
  6. G-Control Measures
  7. B-Data Encryption
  8. N-Incident Reporting
  9. G-Sensitive Information
  10. B-Social Media
  11. B-Workstation Locking
  12. N-Awareness
  13. N-Operational Plan
  14. I-Authentication
  15. B-Document Security
  16. O-Security Clearance
  17. O-Information Sharing
  18. N-Two-Factor Authentication
  19. N-Cybersecurity
  20. G-Digital Footprint
  21. B-Threat Assessment
  22. G-Unauthorized Access
  23. B-Here’s a list of 75 OPSEC-related words and phrases to use for your bingo game:
  24. N-Red Flags
  25. G-Security Culture
  26. I-Personal Security
  27. O-Laptop Security
  28. B-Remote Work
  29. I-Vulnerability
  30. I-Need-to-Know
  31. B-Encryption
  32. G-Badge Security
  33. I-Cloud Security
  34. G-Data Loss
  35. O-Visitor Policy
  36. O-Critical Information
  37. I-Risk
  38. I-OPSEC Cycle
  39. I-Firewall
  40. N-Public Wi-Fi
  41. B-Classified
  42. O-Third-Party Access
  43. B-Surveillance
  44. I-Training
  45. O-Secure Communication
  46. G-Access Control
  47. I-Threat Mitigation
  48. B-Compliance
  49. I-Third-Party Risks
  50. I-Hybrid Schedule
  51. O-Data Breach
  52. O-Security Policy
  53. N-Countermeasures
  54. N-Indicator
  55. O-Password Hygiene
  56. B-Identity Theft
  57. G-Security Breach
  58. G-Adversary
  59. I-Physical Security
  60. G-Email Phishing
  61. N-Insider Threat
  62. O-Oversharing
  63. B-Access Logs
  64. G-Privacy Settings
  65. G-Zero Trust
  66. O-Situational Awareness
  67. B-Multi-layer Security
  68. N-Analysis
  69. B-Social Engineering
  70. I-Tailgating
  71. O-Spyware
  72. N-Secure Disposal
  73. O-Malware
  74. I-Behavioral Patterns
  75. N-Information Lifecycle
  76. G-Network Security