IDENTITYTHEFTPASSPHRASEInternetofThingsHackerANNUALSECURITYTRAININGBUSINESSEMAILCOMPROMISE(BEC)CloudSecuritySHARINGSENSITIVEDATAARTIFICIALINTELLIGENCESMISHINGPHISHINGVISHINGPASSWORDSTRENGTHMETERCYBERSECURITYHYGIENEMALWAREEncryptionSECURITYAWARENESSInformationSecurityKNOWBE4TrojanHorseRANSOMWARESOCIALENGINEERINGCHATGPTVPN(VirtualPrivateNetwork)SpoofingPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHDataBreachMULTI-FACTORAUTHENTICATION(MFA)IDENTITYTHEFTPASSPHRASEInternetofThingsHackerANNUALSECURITYTRAININGBUSINESSEMAILCOMPROMISE(BEC)CloudSecuritySHARINGSENSITIVEDATAARTIFICIALINTELLIGENCESMISHINGPHISHINGVISHINGPASSWORDSTRENGTHMETERCYBERSECURITYHYGIENEMALWAREEncryptionSECURITYAWARENESSInformationSecurityKNOWBE4TrojanHorseRANSOMWARESOCIALENGINEERINGCHATGPTVPN(VirtualPrivateNetwork)SpoofingPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHDataBreachMULTI-FACTORAUTHENTICATION(MFA)

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. IDENTITY THEFT
  2. PASSPHRASE
  3. Internet of Things
  4. Hacker
  5. ANNUAL SECURITY TRAINING
  6. BUSINESS EMAIL COMPROMISE (BEC)
  7. Cloud Security
  8. SHARING SENSITIVE DATA
  9. ARTIFICIAL INTELLIGENCE
  10. SMISHING
  11. PHISHING
  12. VISHING
  13. PASSWORD STRENGTH METER
  14. CYBERSECURITY HYGIENE
  15. MALWARE
  16. Encryption
  17. SECURITY AWARENESS
  18. Information Security
  19. KNOWBE4
  20. Trojan Horse
  21. RANSOMWARE
  22. SOCIAL ENGINEERING
  23. CHATGPT
  24. VPN (Virtual Private Network)
  25. Spoofing
  26. PASSWORD SPRAYING
  27. CYBERSECURITY AWARENESS MONTH
  28. Data Breach
  29. MULTI-FACTOR AUTHENTICATION (MFA)