CyberintelligenceCyberbullying2FABackdoorExploitEncryptionFirewallPhishingPasswordZero-dayexploitVirusVPNPenetrationtestingPIIRootkitMFAITSecurityProgramSpamDenial ofService(DOS)HackerSecuritypostureCrowdstrikeDigitalCertificateNetworkmonitoringVulnerabilityMan-in-the-middleattackSecuritybreachCybersecurityawarenessIdentitytheftRansomwareTrojanKeyloggerCybersecurityinsuranceDataPrivacyIncidentresponsePatchCyberintelligenceCyberbullying2FABackdoorExploitEncryptionFirewallPhishingPasswordZero-dayexploitVirusVPNPenetrationtestingPIIRootkitMFAITSecurityProgramSpamDenial ofService(DOS)HackerSecuritypostureCrowdstrikeDigitalCertificateNetworkmonitoringVulnerabilityMan-in-the-middleattackSecuritybreachCybersecurityawarenessIdentitytheftRansomwareTrojanKeyloggerCybersecurityinsuranceDataPrivacyIncidentresponsePatch

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Cyber intelligence
  2. Cyberbullying
  3. 2FA
  4. Backdoor
  5. Exploit
  6. Encryption
  7. Firewall
  8. Phishing
  9. Password
  10. Zero-day exploit
  11. Virus
  12. VPN
  13. Penetration testing
  14. PII
  15. Rootkit
  16. MFA
  17. IT Security Program
  18. Spam
  19. Denial of Service (DOS)
  20. Hacker
  21. Security posture
  22. Crowdstrike
  23. Digital Certificate
  24. Network monitoring
  25. Vulnerability
  26. Man-in-the-middle attack
  27. Security breach
  28. Cybersecurity awareness
  29. Identity theft
  30. Ransomware
  31. Trojan
  32. Keylogger
  33. Cybersecurity insurance
  34. Data Privacy
  35. Incident response
  36. Patch