PHIVishingVirtualprivatenetwork(VPN)CyberTLS1.2DataBreachAuthenticationInternetKnowBe4RouterClickInternetserviceprovider(ISP)LoginPasswordPhishingIntrusiondetectionsystem(IDS)Securityinformationand eventmanagement(SIEM)EncryptionSecurityFirewallMalwareDeviceTwitterWi-FiOutlookWebsiteExchangeCertificateServerEthernetResponsibilityIntrusionpreventionsystem(IPS)PersonalIdentifyDMZLegalRiskSmishingInformationThreatSmishingDecryptionFacebookOneDriveMaliciousWorkPIIEmailDisableIntranetSuspicious2FA (Twofactorauthentication)CiscoMobileInstagramSharePointVulnerabilityVerifyVishingUsernameMulti-FactorAuthenticationProtectedPHIVishingVirtualprivatenetwork(VPN)CyberTLS1.2DataBreachAuthenticationInternetKnowBe4RouterClickInternetserviceprovider(ISP)LoginPasswordPhishingIntrusiondetectionsystem(IDS)Securityinformationand eventmanagement(SIEM)EncryptionSecurityFirewallMalwareDeviceTwitterWi-FiOutlookWebsiteExchangeCertificateServerEthernetResponsibilityIntrusionpreventionsystem(IPS)PersonalIdentifyDMZLegalRiskSmishingInformationThreatSmishingDecryptionFacebookOneDriveMaliciousWorkPIIEmailDisableIntranetSuspicious2FA (Twofactorauthentication)CiscoMobileInstagramSharePointVulnerabilityVerifyVishingUsernameMulti-FactorAuthenticationProtected

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. PHI
  2. Vishing
  3. Virtual private network (VPN)
  4. Cyber
  5. TLS 1.2
  6. Data Breach
  7. Authentication
  8. Internet
  9. KnowBe4
  10. Router
  11. Click
  12. Internet service provider (ISP)
  13. Login
  14. Password
  15. Phishing
  16. Intrusion detection system (IDS)
  17. Security information and event management (SIEM)
  18. Encryption
  19. Security
  20. Firewall
  21. Malware
  22. Device
  23. Twitter
  24. Wi-Fi
  25. Outlook
  26. Website
  27. Exchange
  28. Certificate
  29. Server
  30. Ethernet
  31. Responsibility
  32. Intrusion prevention system (IPS)
  33. Personal
  34. Identify
  35. DMZ
  36. Legal
  37. Risk
  38. Smishing
  39. Information
  40. Threat
  41. Smishing
  42. Decryption
  43. Facebook
  44. OneDrive
  45. Malicious
  46. Work
  47. PII
  48. Email
  49. Disable
  50. Intranet
  51. Suspicious
  52. 2FA (Two factor authentication)
  53. Cisco
  54. Mobile
  55. Instagram
  56. SharePoint
  57. Vulnerability
  58. Verify
  59. Vishing
  60. Username
  61. Multi-Factor Authentication
  62. Protected