CYBERSECURITYAWARENESSMONTHANNUALSECURITYTRAININGSHARINGSENSITIVEDATAHackerBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSPRAYINGSpoofingPASSPHRASECHATGPTInformationSecurityCYBERSECURITYHYGIENEIDENTITYTHEFTRANSOMWARESOCIALENGINEERINGCloudSecurityDataBreachKNOWBE4MALWAREPHISHINGTrojanHorseMULTI-FACTORAUTHENTICATION(MFA)InternetofThingsSECURITYAWARENESSPASSWORDSTRENGTHMETERVPN(VirtualPrivateNetwork)ARTIFICIALINTELLIGENCEEncryptionVISHINGSMISHINGCYBERSECURITYAWARENESSMONTHANNUALSECURITYTRAININGSHARINGSENSITIVEDATAHackerBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSPRAYINGSpoofingPASSPHRASECHATGPTInformationSecurityCYBERSECURITYHYGIENEIDENTITYTHEFTRANSOMWARESOCIALENGINEERINGCloudSecurityDataBreachKNOWBE4MALWAREPHISHINGTrojanHorseMULTI-FACTORAUTHENTICATION(MFA)InternetofThingsSECURITYAWARENESSPASSWORDSTRENGTHMETERVPN(VirtualPrivateNetwork)ARTIFICIALINTELLIGENCEEncryptionVISHINGSMISHING

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. CYBERSECURITY AWARENESS MONTH
  2. ANNUAL SECURITY TRAINING
  3. SHARING SENSITIVE DATA
  4. Hacker
  5. BUSINESS EMAIL COMPROMISE (BEC)
  6. PASSWORD SPRAYING
  7. Spoofing
  8. PASSPHRASE
  9. CHATGPT
  10. Information Security
  11. CYBERSECURITY HYGIENE
  12. IDENTITY THEFT
  13. RANSOMWARE
  14. SOCIAL ENGINEERING
  15. Cloud Security
  16. Data Breach
  17. KNOWBE4
  18. MALWARE
  19. PHISHING
  20. Trojan Horse
  21. MULTI-FACTOR AUTHENTICATION (MFA)
  22. Internet of Things
  23. SECURITY AWARENESS
  24. PASSWORD STRENGTH METER
  25. VPN (Virtual Private Network)
  26. ARTIFICIAL INTELLIGENCE
  27. Encryption
  28. VISHING
  29. SMISHING