VerifySecurityUsernameOutlook2FA (Twofactorauthentication)WebsiteCyberEmailSecurityinformationand eventmanagement(SIEM)DisableIdentifyRouterPhishingVirtualprivatenetwork(VPN)LegalMalwareDecryptionVishingInformationPIIIntrusiondetectionsystem(IDS)Wi-FiResponsibilityPHIServerVulnerabilityClickWorkFirewallPersonalLoginSharePointRiskEthernetDMZTLS1.2DataBreachIntrusionpreventionsystem(IPS)InternetIntranetAuthenticationSuspiciousProtectedThreatInternetserviceprovider(ISP)MaliciousPasswordEncryptionDeviceCertificateVerifySecurityUsernameOutlook2FA (Twofactorauthentication)WebsiteCyberEmailSecurityinformationand eventmanagement(SIEM)DisableIdentifyRouterPhishingVirtualprivatenetwork(VPN)LegalMalwareDecryptionVishingInformationPIIIntrusiondetectionsystem(IDS)Wi-FiResponsibilityPHIServerVulnerabilityClickWorkFirewallPersonalLoginSharePointRiskEthernetDMZTLS1.2DataBreachIntrusionpreventionsystem(IPS)InternetIntranetAuthenticationSuspiciousProtectedThreatInternetserviceprovider(ISP)MaliciousPasswordEncryptionDeviceCertificate

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Verify
  2. Security
  3. Username
  4. Outlook
  5. 2FA (Two factor authentication)
  6. Website
  7. Cyber
  8. Email
  9. Security information and event management (SIEM)
  10. Disable
  11. Identify
  12. Router
  13. Phishing
  14. Virtual private network (VPN)
  15. Legal
  16. Malware
  17. Decryption
  18. Vishing
  19. Information
  20. PII
  21. Intrusion detection system (IDS)
  22. Wi-Fi
  23. Responsibility
  24. PHI
  25. Server
  26. Vulnerability
  27. Click
  28. Work
  29. Firewall
  30. Personal
  31. Login
  32. SharePoint
  33. Risk
  34. Ethernet
  35. DMZ
  36. TLS 1.2
  37. Data Breach
  38. Intrusion prevention system (IPS)
  39. Internet
  40. Intranet
  41. Authentication
  42. Suspicious
  43. Protected
  44. Threat
  45. Internet service provider (ISP)
  46. Malicious
  47. Password
  48. Encryption
  49. Device
  50. Certificate