DevicePHIVulnerabilityOneDriveWorkIntrusionpreventionsystem(IPS)Internetserviceprovider(ISP)Multi-FactorAuthenticationLoginLegalSharePointDMZVerifyInternetClickPII2FA (Twofactorauthentication)DisableTwitterMaliciousEmailInformationMalwareAuthenticationEncryptionRiskInstagramCyberWebsiteSecurityinformationand eventmanagement(SIEM)RouterSuspiciousKnowBe4IdentifyDataBreachVirtualprivatenetwork(VPN)ProtectedUsernameThreatDecryptionPasswordSmishingTLS1.2PersonalExchangeIntranetCiscoFirewallFacebookEthernetVishingVishingMobileWi-FiOutlookServerSmishingSecurityPhishingResponsibilityCertificateIntrusiondetectionsystem(IDS)DevicePHIVulnerabilityOneDriveWorkIntrusionpreventionsystem(IPS)Internetserviceprovider(ISP)Multi-FactorAuthenticationLoginLegalSharePointDMZVerifyInternetClickPII2FA (Twofactorauthentication)DisableTwitterMaliciousEmailInformationMalwareAuthenticationEncryptionRiskInstagramCyberWebsiteSecurityinformationand eventmanagement(SIEM)RouterSuspiciousKnowBe4IdentifyDataBreachVirtualprivatenetwork(VPN)ProtectedUsernameThreatDecryptionPasswordSmishingTLS1.2PersonalExchangeIntranetCiscoFirewallFacebookEthernetVishingVishingMobileWi-FiOutlookServerSmishingSecurityPhishingResponsibilityCertificateIntrusiondetectionsystem(IDS)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Device
  2. PHI
  3. Vulnerability
  4. OneDrive
  5. Work
  6. Intrusion prevention system (IPS)
  7. Internet service provider (ISP)
  8. Multi-Factor Authentication
  9. Login
  10. Legal
  11. SharePoint
  12. DMZ
  13. Verify
  14. Internet
  15. Click
  16. PII
  17. 2FA (Two factor authentication)
  18. Disable
  19. Twitter
  20. Malicious
  21. Email
  22. Information
  23. Malware
  24. Authentication
  25. Encryption
  26. Risk
  27. Instagram
  28. Cyber
  29. Website
  30. Security information and event management (SIEM)
  31. Router
  32. Suspicious
  33. KnowBe4
  34. Identify
  35. Data Breach
  36. Virtual private network (VPN)
  37. Protected
  38. Username
  39. Threat
  40. Decryption
  41. Password
  42. Smishing
  43. TLS 1.2
  44. Personal
  45. Exchange
  46. Intranet
  47. Cisco
  48. Firewall
  49. Facebook
  50. Ethernet
  51. Vishing
  52. Vishing
  53. Mobile
  54. Wi-Fi
  55. Outlook
  56. Server
  57. Smishing
  58. Security
  59. Phishing
  60. Responsibility
  61. Certificate
  62. Intrusion detection system (IDS)