PasswordHackerBackdoorSpamCyberintelligenceITSecurityProgramCybersecurityinsuranceRansomwarePIIPenetrationtestingNetworkmonitoringDataPrivacyMan-in-the-middleattackCybersecurityawarenessPhishingPatch2FADenial ofService(DOS)VPNZero-dayexploitDigitalCertificateRootkitFirewallCrowdstrikeExploitIncidentresponseEncryptionVirusCyberbullyingMFASecuritypostureVulnerabilitySecuritybreachKeyloggerTrojanIdentitytheftPasswordHackerBackdoorSpamCyberintelligenceITSecurityProgramCybersecurityinsuranceRansomwarePIIPenetrationtestingNetworkmonitoringDataPrivacyMan-in-the-middleattackCybersecurityawarenessPhishingPatch2FADenial ofService(DOS)VPNZero-dayexploitDigitalCertificateRootkitFirewallCrowdstrikeExploitIncidentresponseEncryptionVirusCyberbullyingMFASecuritypostureVulnerabilitySecuritybreachKeyloggerTrojanIdentitytheft

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Password
  2. Hacker
  3. Backdoor
  4. Spam
  5. Cyber intelligence
  6. IT Security Program
  7. Cybersecurity insurance
  8. Ransomware
  9. PII
  10. Penetration testing
  11. Network monitoring
  12. Data Privacy
  13. Man-in-the-middle attack
  14. Cybersecurity awareness
  15. Phishing
  16. Patch
  17. 2FA
  18. Denial of Service (DOS)
  19. VPN
  20. Zero-day exploit
  21. Digital Certificate
  22. Rootkit
  23. Firewall
  24. Crowdstrike
  25. Exploit
  26. Incident response
  27. Encryption
  28. Virus
  29. Cyberbullying
  30. MFA
  31. Security posture
  32. Vulnerability
  33. Security breach
  34. Keylogger
  35. Trojan
  36. Identity theft