FacebookMaliciousOutlookPIIIntrusionpreventionsystem(IPS)EncryptionExchangeCertificateEthernetWorkIdentifySharePointAuthenticationInternetserviceprovider(ISP)PHILoginIntrusiondetectionsystem(IDS)EmailMulti-FactorAuthenticationInternetSmishingKnowBe4ThreatPhishingProtectedOneDriveDataBreachDecryptionCiscoSecurityinformationand eventmanagement(SIEM)MalwareMobileRiskRouterVerifyLegalPersonalVishingUsernameSmishingFirewallWebsite2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)ResponsibilityCyberDMZTLS1.2InformationDeviceTwitterClickInstagramVulnerabilityWi-FiPasswordSecurityVishingIntranetDisableServerSuspiciousFacebookMaliciousOutlookPIIIntrusionpreventionsystem(IPS)EncryptionExchangeCertificateEthernetWorkIdentifySharePointAuthenticationInternetserviceprovider(ISP)PHILoginIntrusiondetectionsystem(IDS)EmailMulti-FactorAuthenticationInternetSmishingKnowBe4ThreatPhishingProtectedOneDriveDataBreachDecryptionCiscoSecurityinformationand eventmanagement(SIEM)MalwareMobileRiskRouterVerifyLegalPersonalVishingUsernameSmishingFirewallWebsite2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)ResponsibilityCyberDMZTLS1.2InformationDeviceTwitterClickInstagramVulnerabilityWi-FiPasswordSecurityVishingIntranetDisableServerSuspicious

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Facebook
  2. Malicious
  3. Outlook
  4. PII
  5. Intrusion prevention system (IPS)
  6. Encryption
  7. Exchange
  8. Certificate
  9. Ethernet
  10. Work
  11. Identify
  12. SharePoint
  13. Authentication
  14. Internet service provider (ISP)
  15. PHI
  16. Login
  17. Intrusion detection system (IDS)
  18. Email
  19. Multi-Factor Authentication
  20. Internet
  21. Smishing
  22. KnowBe4
  23. Threat
  24. Phishing
  25. Protected
  26. OneDrive
  27. Data Breach
  28. Decryption
  29. Cisco
  30. Security information and event management (SIEM)
  31. Malware
  32. Mobile
  33. Risk
  34. Router
  35. Verify
  36. Legal
  37. Personal
  38. Vishing
  39. Username
  40. Smishing
  41. Firewall
  42. Website
  43. 2FA (Two factor authentication)
  44. Virtual private network (VPN)
  45. Responsibility
  46. Cyber
  47. DMZ
  48. TLS 1.2
  49. Information
  50. Device
  51. Twitter
  52. Click
  53. Instagram
  54. Vulnerability
  55. Wi-Fi
  56. Password
  57. Security
  58. Vishing
  59. Intranet
  60. Disable
  61. Server
  62. Suspicious