OutlookFacebookKnowBe4RouterEmailInternetserviceprovider(ISP)SecurityEthernetSmishingPHIWebsiteDeviceTwitterPhishingDisableVerifyInstagramDecryptionVishingSmishingVirtualprivatenetwork(VPN)PIIIntrusiondetectionsystem(IDS)MalwareProtectedCertificateDataBreachLegalExchangeFirewallIdentifySuspiciousRiskClickServerUsernameIntrusionpreventionsystem(IPS)VulnerabilitySharePointWi-FiLoginInternetMobileAuthenticationCyberDMZMulti-FactorAuthenticationIntranetCiscoTLS1.2EncryptionInformationOneDriveResponsibilityPersonal2FA (Twofactorauthentication)Securityinformationand eventmanagement(SIEM)MaliciousVishingPasswordWorkThreatOutlookFacebookKnowBe4RouterEmailInternetserviceprovider(ISP)SecurityEthernetSmishingPHIWebsiteDeviceTwitterPhishingDisableVerifyInstagramDecryptionVishingSmishingVirtualprivatenetwork(VPN)PIIIntrusiondetectionsystem(IDS)MalwareProtectedCertificateDataBreachLegalExchangeFirewallIdentifySuspiciousRiskClickServerUsernameIntrusionpreventionsystem(IPS)VulnerabilitySharePointWi-FiLoginInternetMobileAuthenticationCyberDMZMulti-FactorAuthenticationIntranetCiscoTLS1.2EncryptionInformationOneDriveResponsibilityPersonal2FA (Twofactorauthentication)Securityinformationand eventmanagement(SIEM)MaliciousVishingPasswordWorkThreat

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Outlook
  2. Facebook
  3. KnowBe4
  4. Router
  5. Email
  6. Internet service provider (ISP)
  7. Security
  8. Ethernet
  9. Smishing
  10. PHI
  11. Website
  12. Device
  13. Twitter
  14. Phishing
  15. Disable
  16. Verify
  17. Instagram
  18. Decryption
  19. Vishing
  20. Smishing
  21. Virtual private network (VPN)
  22. PII
  23. Intrusion detection system (IDS)
  24. Malware
  25. Protected
  26. Certificate
  27. Data Breach
  28. Legal
  29. Exchange
  30. Firewall
  31. Identify
  32. Suspicious
  33. Risk
  34. Click
  35. Server
  36. Username
  37. Intrusion prevention system (IPS)
  38. Vulnerability
  39. SharePoint
  40. Wi-Fi
  41. Login
  42. Internet
  43. Mobile
  44. Authentication
  45. Cyber
  46. DMZ
  47. Multi-Factor Authentication
  48. Intranet
  49. Cisco
  50. TLS 1.2
  51. Encryption
  52. Information
  53. OneDrive
  54. Responsibility
  55. Personal
  56. 2FA (Two factor authentication)
  57. Security information and event management (SIEM)
  58. Malicious
  59. Vishing
  60. Password
  61. Work
  62. Threat