VulnerabilitySecurityPasswordKnowBe4Internetserviceprovider(ISP)InstagramPhishingTwitterPIIDecryptionClickEmailRouterServerInformationDeviceWorkAuthenticationEthernetInternetCyberMalwareUsernameIntrusiondetectionsystem(IDS)CertificateWebsiteResponsibility2FA (Twofactorauthentication)DisablePersonalSmishingThreatLoginTLS1.2CiscoSharePointOutlookEncryptionIntranetSmishingMobileOneDriveLegalVishingRiskSecurityinformationand eventmanagement(SIEM)IdentifyWi-FiFacebookVerifyDataBreachPHIMaliciousExchangeSuspiciousVishingMulti-FactorAuthenticationIntrusionpreventionsystem(IPS)Virtualprivatenetwork(VPN)ProtectedFirewallDMZVulnerabilitySecurityPasswordKnowBe4Internetserviceprovider(ISP)InstagramPhishingTwitterPIIDecryptionClickEmailRouterServerInformationDeviceWorkAuthenticationEthernetInternetCyberMalwareUsernameIntrusiondetectionsystem(IDS)CertificateWebsiteResponsibility2FA (Twofactorauthentication)DisablePersonalSmishingThreatLoginTLS1.2CiscoSharePointOutlookEncryptionIntranetSmishingMobileOneDriveLegalVishingRiskSecurityinformationand eventmanagement(SIEM)IdentifyWi-FiFacebookVerifyDataBreachPHIMaliciousExchangeSuspiciousVishingMulti-FactorAuthenticationIntrusionpreventionsystem(IPS)Virtualprivatenetwork(VPN)ProtectedFirewallDMZ

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Vulnerability
  2. Security
  3. Password
  4. KnowBe4
  5. Internet service provider (ISP)
  6. Instagram
  7. Phishing
  8. Twitter
  9. PII
  10. Decryption
  11. Click
  12. Email
  13. Router
  14. Server
  15. Information
  16. Device
  17. Work
  18. Authentication
  19. Ethernet
  20. Internet
  21. Cyber
  22. Malware
  23. Username
  24. Intrusion detection system (IDS)
  25. Certificate
  26. Website
  27. Responsibility
  28. 2FA (Two factor authentication)
  29. Disable
  30. Personal
  31. Smishing
  32. Threat
  33. Login
  34. TLS 1.2
  35. Cisco
  36. SharePoint
  37. Outlook
  38. Encryption
  39. Intranet
  40. Smishing
  41. Mobile
  42. OneDrive
  43. Legal
  44. Vishing
  45. Risk
  46. Security information and event management (SIEM)
  47. Identify
  48. Wi-Fi
  49. Facebook
  50. Verify
  51. Data Breach
  52. PHI
  53. Malicious
  54. Exchange
  55. Suspicious
  56. Vishing
  57. Multi-Factor Authentication
  58. Intrusion prevention system (IPS)
  59. Virtual private network (VPN)
  60. Protected
  61. Firewall
  62. DMZ