PASSPHRASECYBERSECURITYAWARENESSMONTHTrojanHorseARTIFICIALINTELLIGENCEMULTI-FACTORAUTHENTICATION(MFA)EncryptionCHATGPTANNUALSECURITYTRAININGCloudSecurityPHISHINGCYBERSECURITYHYGIENEBUSINESSEMAILCOMPROMISE(BEC)SpoofingSHARINGSENSITIVEDATAInformationSecurityIDENTITYTHEFTVISHINGInternetofThingsSMISHINGMALWARERANSOMWARESECURITYAWARENESSPASSWORDSTRENGTHMETERKNOWBE4HackerPASSWORDSPRAYINGDataBreachVPN(VirtualPrivateNetwork)SOCIALENGINEERINGPASSPHRASECYBERSECURITYAWARENESSMONTHTrojanHorseARTIFICIALINTELLIGENCEMULTI-FACTORAUTHENTICATION(MFA)EncryptionCHATGPTANNUALSECURITYTRAININGCloudSecurityPHISHINGCYBERSECURITYHYGIENEBUSINESSEMAILCOMPROMISE(BEC)SpoofingSHARINGSENSITIVEDATAInformationSecurityIDENTITYTHEFTVISHINGInternetofThingsSMISHINGMALWARERANSOMWARESECURITYAWARENESSPASSWORDSTRENGTHMETERKNOWBE4HackerPASSWORDSPRAYINGDataBreachVPN(VirtualPrivateNetwork)SOCIALENGINEERING

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. PASSPHRASE
  2. CYBERSECURITY AWARENESS MONTH
  3. Trojan Horse
  4. ARTIFICIAL INTELLIGENCE
  5. MULTI-FACTOR AUTHENTICATION (MFA)
  6. Encryption
  7. CHATGPT
  8. ANNUAL SECURITY TRAINING
  9. Cloud Security
  10. PHISHING
  11. CYBERSECURITY HYGIENE
  12. BUSINESS EMAIL COMPROMISE (BEC)
  13. Spoofing
  14. SHARING SENSITIVE DATA
  15. Information Security
  16. IDENTITY THEFT
  17. VISHING
  18. Internet of Things
  19. SMISHING
  20. MALWARE
  21. RANSOMWARE
  22. SECURITY AWARENESS
  23. PASSWORD STRENGTH METER
  24. KNOWBE4
  25. Hacker
  26. PASSWORD SPRAYING
  27. Data Breach
  28. VPN (Virtual Private Network)
  29. SOCIAL ENGINEERING