VPN2FAITSecurityProgramTrojanZero-dayexploitCyberintelligenceNetworkmonitoringPasswordCybersecurityawarenessIncidentresponseHackerCybersecurityinsuranceDenial ofService(DOS)RansomwareSpamKeyloggerSecuritybreachPhishingPIIPatchIdentitytheftMFAVulnerabilityExploitDataPrivacySecuritypostureBackdoorVirusRootkitFirewallMan-in-the-middleattackDigitalCertificateCrowdstrikeEncryptionCyberbullyingPenetrationtestingVPN2FAITSecurityProgramTrojanZero-dayexploitCyberintelligenceNetworkmonitoringPasswordCybersecurityawarenessIncidentresponseHackerCybersecurityinsuranceDenial ofService(DOS)RansomwareSpamKeyloggerSecuritybreachPhishingPIIPatchIdentitytheftMFAVulnerabilityExploitDataPrivacySecuritypostureBackdoorVirusRootkitFirewallMan-in-the-middleattackDigitalCertificateCrowdstrikeEncryptionCyberbullyingPenetrationtesting

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. VPN
  2. 2FA
  3. IT Security Program
  4. Trojan
  5. Zero-day exploit
  6. Cyber intelligence
  7. Network monitoring
  8. Password
  9. Cybersecurity awareness
  10. Incident response
  11. Hacker
  12. Cybersecurity insurance
  13. Denial of Service (DOS)
  14. Ransomware
  15. Spam
  16. Keylogger
  17. Security breach
  18. Phishing
  19. PII
  20. Patch
  21. Identity theft
  22. MFA
  23. Vulnerability
  24. Exploit
  25. Data Privacy
  26. Security posture
  27. Backdoor
  28. Virus
  29. Rootkit
  30. Firewall
  31. Man-in-the-middle attack
  32. Digital Certificate
  33. Crowdstrike
  34. Encryption
  35. Cyberbullying
  36. Penetration testing