Internetserviceprovider(ISP)Intrusiondetectionsystem(IDS)LoginVerifyPhishingFacebookKnowBe4Intrusionpreventionsystem(IPS)PIISecurityinformationand eventmanagement(SIEM)PHIDisableVishingDMZ2FA (Twofactorauthentication)DataBreachInformationMaliciousOneDriveInstagramSuspiciousExchangeMulti-FactorAuthenticationDeviceTwitterInternetThreatSmishingWorkCertificateCiscoServerAuthenticationVulnerabilityFirewallSmishingCyberLegalSharePointUsernameDecryptionMalwareIntranetMobileOutlookVirtualprivatenetwork(VPN)TLS1.2EmailProtectedWebsiteEthernetClickSecurityVishingWi-FiRiskResponsibilityPersonalIdentifyEncryptionPasswordRouterInternetserviceprovider(ISP)Intrusiondetectionsystem(IDS)LoginVerifyPhishingFacebookKnowBe4Intrusionpreventionsystem(IPS)PIISecurityinformationand eventmanagement(SIEM)PHIDisableVishingDMZ2FA (Twofactorauthentication)DataBreachInformationMaliciousOneDriveInstagramSuspiciousExchangeMulti-FactorAuthenticationDeviceTwitterInternetThreatSmishingWorkCertificateCiscoServerAuthenticationVulnerabilityFirewallSmishingCyberLegalSharePointUsernameDecryptionMalwareIntranetMobileOutlookVirtualprivatenetwork(VPN)TLS1.2EmailProtectedWebsiteEthernetClickSecurityVishingWi-FiRiskResponsibilityPersonalIdentifyEncryptionPasswordRouter

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Internet service provider (ISP)
  2. Intrusion detection system (IDS)
  3. Login
  4. Verify
  5. Phishing
  6. Facebook
  7. KnowBe4
  8. Intrusion prevention system (IPS)
  9. PII
  10. Security information and event management (SIEM)
  11. PHI
  12. Disable
  13. Vishing
  14. DMZ
  15. 2FA (Two factor authentication)
  16. Data Breach
  17. Information
  18. Malicious
  19. OneDrive
  20. Instagram
  21. Suspicious
  22. Exchange
  23. Multi-Factor Authentication
  24. Device
  25. Twitter
  26. Internet
  27. Threat
  28. Smishing
  29. Work
  30. Certificate
  31. Cisco
  32. Server
  33. Authentication
  34. Vulnerability
  35. Firewall
  36. Smishing
  37. Cyber
  38. Legal
  39. SharePoint
  40. Username
  41. Decryption
  42. Malware
  43. Intranet
  44. Mobile
  45. Outlook
  46. Virtual private network (VPN)
  47. TLS 1.2
  48. Email
  49. Protected
  50. Website
  51. Ethernet
  52. Click
  53. Security
  54. Vishing
  55. Wi-Fi
  56. Risk
  57. Responsibility
  58. Personal
  59. Identify
  60. Encryption
  61. Password
  62. Router