MobileInternetserviceprovider(ISP)SecurityResponsibilityIntranetTLS1.2Wi-FiCertificateServerPHISmishingRiskVishingCiscoInstagramPasswordInternetSecurityinformationand eventmanagement(SIEM)MalwarePhishingThreatExchangeVishingIntrusiondetectionsystem(IDS)DataBreachVirtualprivatenetwork(VPN)PIIWorkOutlook2FA (Twofactorauthentication)KnowBe4WebsiteDMZInformationLegalOneDriveFacebookProtectedVerifyRouterPersonalAuthenticationClickIntrusionpreventionsystem(IPS)TwitterEncryptionEthernetVulnerabilitySuspiciousMulti-FactorAuthenticationLoginCyberEmailMaliciousIdentifySmishingSharePointDeviceDecryptionFirewallUsernameDisableMobileInternetserviceprovider(ISP)SecurityResponsibilityIntranetTLS1.2Wi-FiCertificateServerPHISmishingRiskVishingCiscoInstagramPasswordInternetSecurityinformationand eventmanagement(SIEM)MalwarePhishingThreatExchangeVishingIntrusiondetectionsystem(IDS)DataBreachVirtualprivatenetwork(VPN)PIIWorkOutlook2FA (Twofactorauthentication)KnowBe4WebsiteDMZInformationLegalOneDriveFacebookProtectedVerifyRouterPersonalAuthenticationClickIntrusionpreventionsystem(IPS)TwitterEncryptionEthernetVulnerabilitySuspiciousMulti-FactorAuthenticationLoginCyberEmailMaliciousIdentifySmishingSharePointDeviceDecryptionFirewallUsernameDisable

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Mobile
  2. Internet service provider (ISP)
  3. Security
  4. Responsibility
  5. Intranet
  6. TLS 1.2
  7. Wi-Fi
  8. Certificate
  9. Server
  10. PHI
  11. Smishing
  12. Risk
  13. Vishing
  14. Cisco
  15. Instagram
  16. Password
  17. Internet
  18. Security information and event management (SIEM)
  19. Malware
  20. Phishing
  21. Threat
  22. Exchange
  23. Vishing
  24. Intrusion detection system (IDS)
  25. Data Breach
  26. Virtual private network (VPN)
  27. PII
  28. Work
  29. Outlook
  30. 2FA (Two factor authentication)
  31. KnowBe4
  32. Website
  33. DMZ
  34. Information
  35. Legal
  36. OneDrive
  37. Facebook
  38. Protected
  39. Verify
  40. Router
  41. Personal
  42. Authentication
  43. Click
  44. Intrusion prevention system (IPS)
  45. Twitter
  46. Encryption
  47. Ethernet
  48. Vulnerability
  49. Suspicious
  50. Multi-Factor Authentication
  51. Login
  52. Cyber
  53. Email
  54. Malicious
  55. Identify
  56. Smishing
  57. SharePoint
  58. Device
  59. Decryption
  60. Firewall
  61. Username
  62. Disable