InternetofThingsDataBreachPHISHINGMobileApplicationManagement(MAM)PASSPHRASEVirusCHATGPTVPN(VirtualPrivateNetwork)KNOWBE4VISHINGHackerARTIFICIALINTELLIGENCEDataPrivacyPASSWORDSTRENGTHMETERCYBERSECURITYAWARENESSMONTHInformationSecuritySECURITYAWARENESSIDENTITYTHEFTANNUALSECURITYTRAININGRANSOMWAREEncryptionMALWARESMISHINGSOCIALENGINEERINGMULTI-FACTORAUTHENTICATION(MFA)QRCodeScamsPublicWi-FiCYBERSECURITYHYGIENESocialMediaScamsSHARINGSENSITIVEDATAPASSWORDSPRAYINGUSBPolicyTechTrojanHorsePhishAlertButton(PAB)SpoofingCloudSecurityBUSINESSEMAILCOMPROMISE(BEC)InternetofThingsDataBreachPHISHINGMobileApplicationManagement(MAM)PASSPHRASEVirusCHATGPTVPN(VirtualPrivateNetwork)KNOWBE4VISHINGHackerARTIFICIALINTELLIGENCEDataPrivacyPASSWORDSTRENGTHMETERCYBERSECURITYAWARENESSMONTHInformationSecuritySECURITYAWARENESSIDENTITYTHEFTANNUALSECURITYTRAININGRANSOMWAREEncryptionMALWARESMISHINGSOCIALENGINEERINGMULTI-FACTORAUTHENTICATION(MFA)QRCodeScamsPublicWi-FiCYBERSECURITYHYGIENESocialMediaScamsSHARINGSENSITIVEDATAPASSWORDSPRAYINGUSBPolicyTechTrojanHorsePhishAlertButton(PAB)SpoofingCloudSecurityBUSINESSEMAILCOMPROMISE(BEC)

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Internet of Things
  2. Data Breach
  3. PHISHING
  4. Mobile Application Management (MAM)
  5. PASSPHRASE
  6. Virus
  7. CHATGPT
  8. VPN (Virtual Private Network)
  9. KNOWBE4
  10. VISHING
  11. Hacker
  12. ARTIFICIAL INTELLIGENCE
  13. Data Privacy
  14. PASSWORD STRENGTH METER
  15. CYBERSECURITY AWARENESS MONTH
  16. Information Security
  17. SECURITY AWARENESS
  18. IDENTITY THEFT
  19. ANNUAL SECURITY TRAINING
  20. RANSOMWARE
  21. Encryption
  22. MALWARE
  23. SMISHING
  24. SOCIAL ENGINEERING
  25. MULTI-FACTOR AUTHENTICATION (MFA)
  26. QR Code Scams
  27. Public Wi-Fi
  28. CYBERSECURITY HYGIENE
  29. Social Media Scams
  30. SHARING SENSITIVE DATA
  31. PASSWORD SPRAYING
  32. USB
  33. PolicyTech
  34. Trojan Horse
  35. Phish Alert Button (PAB)
  36. Spoofing
  37. Cloud Security
  38. BUSINESS EMAIL COMPROMISE (BEC)