EncryptionAwarenessTrainingBreachWormScreenlockpolicyPhishingPasswordManagerWhalephishingMulti-factorauthentication(MFA)DarkwebExtorsionExploitMalwareBackupsPersonallyidentifiableinformation(PII)TrainingVulnerabilityCompromiseScarewareCyberattackZero-daySpearphishingVirusSoftwareupdatesIntrusionEncryptionAwarenessTrainingBreachWormScreenlockpolicyPhishingPasswordManagerWhalephishingMulti-factorauthentication(MFA)DarkwebExtorsionExploitMalwareBackupsPersonallyidentifiableinformation(PII)TrainingVulnerabilityCompromiseScarewareCyberattackZero-daySpearphishingVirusSoftwareupdatesIntrusion

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Encryption
  2. Awareness Training
  3. Breach
  4. Worm
  5. Screen lock policy
  6. Phishing
  7. Password Manager
  8. Whale phishing
  9. Multi-factor authentication (MFA)
  10. Dark web
  11. Extorsion
  12. Exploit
  13. Malware
  14. Backups
  15. Personally identifiable information (PII)
  16. Training
  17. Vulnerability
  18. Compromise
  19. Scareware
  20. Cyberattack
  21. Zero-day
  22. Spear phishing
  23. Virus
  24. Software updates
  25. Intrusion