VPN Penetration testing Security posture Cybersecurity awareness Man-in- the- middle attack Firewall Hacker Patch MFA Security breach Denial of Service (DOS) Cyberbullying Vulnerability Encryption Cybersecurity insurance Ransomware Keylogger Rootkit Crowdstrike Backdoor Exploit Network monitoring Spam Virus Digital Certificate 2FA Trojan IT Security Program Cyber intelligence Identity theft Data Privacy Incident response Password PII Phishing Zero- day exploit VPN Penetration testing Security posture Cybersecurity awareness Man-in- the- middle attack Firewall Hacker Patch MFA Security breach Denial of Service (DOS) Cyberbullying Vulnerability Encryption Cybersecurity insurance Ransomware Keylogger Rootkit Crowdstrike Backdoor Exploit Network monitoring Spam Virus Digital Certificate 2FA Trojan IT Security Program Cyber intelligence Identity theft Data Privacy Incident response Password PII Phishing Zero- day exploit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPN
Penetration testing
Security posture
Cybersecurity awareness
Man-in-the-middle attack
Firewall
Hacker
Patch
MFA
Security breach
Denial of Service (DOS)
Cyberbullying
Vulnerability
Encryption
Cybersecurity insurance
Ransomware
Keylogger
Rootkit
Crowdstrike
Backdoor
Exploit
Network monitoring
Spam
Virus
Digital Certificate
2FA
Trojan
IT Security Program
Cyber intelligence
Identity theft
Data Privacy
Incident response
Password
PII
Phishing
Zero-day exploit