MaliciousInternetserviceprovider(ISP)VishingPasswordLoginRiskLegalProtectedFirewallPIIVulnerabilityPhishingIntrusiondetectionsystem(IDS)WorkVirtualprivatenetwork(VPN)SuspiciousDecryptionRouterMalwareThreatDisableOutlookMobilePHIEmailSecurityinformationand eventmanagement(SIEM)Intrusionpreventionsystem(IPS)ClickEncryptionDMZFacebookUsernameCertificateAuthenticationServerDeviceSmishingInformationIdentifyKnowBe4DataBreachTwitterWi-FiOneDriveCiscoMulti-FactorAuthenticationResponsibilityInternetSharePointTLS1.2IntranetSecurityExchangeEthernetCyber2FA (Twofactorauthentication)WebsiteSmishingVishingVerifyInstagramPersonalMaliciousInternetserviceprovider(ISP)VishingPasswordLoginRiskLegalProtectedFirewallPIIVulnerabilityPhishingIntrusiondetectionsystem(IDS)WorkVirtualprivatenetwork(VPN)SuspiciousDecryptionRouterMalwareThreatDisableOutlookMobilePHIEmailSecurityinformationand eventmanagement(SIEM)Intrusionpreventionsystem(IPS)ClickEncryptionDMZFacebookUsernameCertificateAuthenticationServerDeviceSmishingInformationIdentifyKnowBe4DataBreachTwitterWi-FiOneDriveCiscoMulti-FactorAuthenticationResponsibilityInternetSharePointTLS1.2IntranetSecurityExchangeEthernetCyber2FA (Twofactorauthentication)WebsiteSmishingVishingVerifyInstagramPersonal

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Malicious
  2. Internet service provider (ISP)
  3. Vishing
  4. Password
  5. Login
  6. Risk
  7. Legal
  8. Protected
  9. Firewall
  10. PII
  11. Vulnerability
  12. Phishing
  13. Intrusion detection system (IDS)
  14. Work
  15. Virtual private network (VPN)
  16. Suspicious
  17. Decryption
  18. Router
  19. Malware
  20. Threat
  21. Disable
  22. Outlook
  23. Mobile
  24. PHI
  25. Email
  26. Security information and event management (SIEM)
  27. Intrusion prevention system (IPS)
  28. Click
  29. Encryption
  30. DMZ
  31. Facebook
  32. Username
  33. Certificate
  34. Authentication
  35. Server
  36. Device
  37. Smishing
  38. Information
  39. Identify
  40. KnowBe4
  41. Data Breach
  42. Twitter
  43. Wi-Fi
  44. OneDrive
  45. Cisco
  46. Multi-Factor Authentication
  47. Responsibility
  48. Internet
  49. SharePoint
  50. TLS 1.2
  51. Intranet
  52. Security
  53. Exchange
  54. Ethernet
  55. Cyber
  56. 2FA (Two factor authentication)
  57. Website
  58. Smishing
  59. Vishing
  60. Verify
  61. Instagram
  62. Personal