VirusPhishingCyber*IPSICSHosedExploitVulnerabilityMalwareRansomwareCryptoRiskTraditionalITLockheedMartinCriticalSystemsThreatDetectionHackerKillChainASMSecureNotPETyaNIDSControlsNetworkLeidosPWNeDVirusPhishingCyber*IPSICSHosedExploitVulnerabilityMalwareRansomwareCryptoRiskTraditionalITLockheedMartinCriticalSystemsThreatDetectionHackerKillChainASMSecureNotPETyaNIDSControlsNetworkLeidosPWNeD

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Virus
  2. Phishing
  3. Cyber*
  4. IPS
  5. ICS
  6. Hosed
  7. Exploit
  8. Vulnerability
  9. Malware
  10. Ransomware
  11. Crypto
  12. Risk
  13. Traditional IT
  14. Lockheed Martin
  15. Critical Systems
  16. Threat Detection
  17. Hacker
  18. Kill Chain
  19. ASM
  20. Secure
  21. NotPETya
  22. NIDS
  23. Controls Network
  24. Leidos
  25. PWNeD