2FAMFADataPrivacyZero-dayexploitCybersecurityinsuranceExploitRansomwareMan-in-the-middleattackPhishingSecuritybreachDigitalCertificateCrowdstrikeRootkitCybersecurityawarenessIncidentresponseTrojanSpamDenial ofService(DOS)IdentitytheftEncryptionVulnerabilityBackdoorSecurityposturePIIITSecurityProgramFirewallHackerPasswordVirusVPNNetworkmonitoringCyberbullyingKeyloggerPenetrationtestingCyberintelligencePatch2FAMFADataPrivacyZero-dayexploitCybersecurityinsuranceExploitRansomwareMan-in-the-middleattackPhishingSecuritybreachDigitalCertificateCrowdstrikeRootkitCybersecurityawarenessIncidentresponseTrojanSpamDenial ofService(DOS)IdentitytheftEncryptionVulnerabilityBackdoorSecurityposturePIIITSecurityProgramFirewallHackerPasswordVirusVPNNetworkmonitoringCyberbullyingKeyloggerPenetrationtestingCyberintelligencePatch

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. 2FA
  2. MFA
  3. Data Privacy
  4. Zero-day exploit
  5. Cybersecurity insurance
  6. Exploit
  7. Ransomware
  8. Man-in-the-middle attack
  9. Phishing
  10. Security breach
  11. Digital Certificate
  12. Crowdstrike
  13. Rootkit
  14. Cybersecurity awareness
  15. Incident response
  16. Trojan
  17. Spam
  18. Denial of Service (DOS)
  19. Identity theft
  20. Encryption
  21. Vulnerability
  22. Backdoor
  23. Security posture
  24. PII
  25. IT Security Program
  26. Firewall
  27. Hacker
  28. Password
  29. Virus
  30. VPN
  31. Network monitoring
  32. Cyberbullying
  33. Keylogger
  34. Penetration testing
  35. Cyber intelligence
  36. Patch