SOCIALENGINEERINGSMISHINGANNUALSECURITYTRAININGSpoofingCHATGPTCloudSecurityCYBERSECURITYHYGIENERANSOMWAREInternetofThingsVISHINGEncryptionHackerTrojanHorseSECURITYAWARENESSInformationSecurityPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHSHARINGSENSITIVEDATAMULTI-FACTORAUTHENTICATION(MFA)PASSWORDSTRENGTHMETERBUSINESSEMAILCOMPROMISE(BEC)KNOWBE4PASSPHRASEPHISHINGMALWAREVPN(VirtualPrivateNetwork)IDENTITYTHEFTARTIFICIALINTELLIGENCEDataBreachSOCIALENGINEERINGSMISHINGANNUALSECURITYTRAININGSpoofingCHATGPTCloudSecurityCYBERSECURITYHYGIENERANSOMWAREInternetofThingsVISHINGEncryptionHackerTrojanHorseSECURITYAWARENESSInformationSecurityPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHSHARINGSENSITIVEDATAMULTI-FACTORAUTHENTICATION(MFA)PASSWORDSTRENGTHMETERBUSINESSEMAILCOMPROMISE(BEC)KNOWBE4PASSPHRASEPHISHINGMALWAREVPN(VirtualPrivateNetwork)IDENTITYTHEFTARTIFICIALINTELLIGENCEDataBreach

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. SOCIAL ENGINEERING
  2. SMISHING
  3. ANNUAL SECURITY TRAINING
  4. Spoofing
  5. CHATGPT
  6. Cloud Security
  7. CYBERSECURITY HYGIENE
  8. RANSOMWARE
  9. Internet of Things
  10. VISHING
  11. Encryption
  12. Hacker
  13. Trojan Horse
  14. SECURITY AWARENESS
  15. Information Security
  16. PASSWORD SPRAYING
  17. CYBERSECURITY AWARENESS MONTH
  18. SHARING SENSITIVE DATA
  19. MULTI-FACTOR AUTHENTICATION (MFA)
  20. PASSWORD STRENGTH METER
  21. BUSINESS EMAIL COMPROMISE (BEC)
  22. KNOWBE4
  23. PASSPHRASE
  24. PHISHING
  25. MALWARE
  26. VPN (Virtual Private Network)
  27. IDENTITY THEFT
  28. ARTIFICIAL INTELLIGENCE
  29. Data Breach