availabilityBECOSAPTCIAtriadidentitytheftEDRbusinesscontinuitywormriskassessmentIOCsmishingescalationvulnerabilityWISPvishingSyssecAdminpassphrasephishingspamCyberSecuritysocialengineeringincidentresponsepacketbotnetencryptionfirewallCyberDefenseDarkWebDefense-in-depthFTPspywarebuginsiderthreatzero-daytrainingIPHIPAArootkitIoTconfidentialitycompliancepasswordpentestantivirusPIIspoofingriskvirusexploitcyberattacksecuritypolicyMFAIPSPHIVPNhackernetworkDDoSIDSdefenseevasionmalwarebreachincidentadmincryptographyintegritysecurityawarenessresilienceransomwareSecurityOperationsavailabilityBECOSAPTCIAtriadidentitytheftEDRbusinesscontinuitywormriskassessmentIOCsmishingescalationvulnerabilityWISPvishingSyssecAdminpassphrasephishingspamCyberSecuritysocialengineeringincidentresponsepacketbotnetencryptionfirewallCyberDefenseDarkWebDefense-in-depthFTPspywarebuginsiderthreatzero-daytrainingIPHIPAArootkitIoTconfidentialitycompliancepasswordpentestantivirusPIIspoofingriskvirusexploitcyberattacksecuritypolicyMFAIPSPHIVPNhackernetworkDDoSIDSdefenseevasionmalwarebreachincidentadmincryptographyintegritysecurityawarenessresilienceransomwareSecurityOperations

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. availability
  2. BEC
  3. OS
  4. APT
  5. CIA triad
  6. identity theft
  7. EDR
  8. business continuity
  9. worm
  10. risk assessment
  11. IOC
  12. smishing
  13. escalation
  14. vulnerability
  15. WISP
  16. vishing
  17. SyssecAdmin
  18. passphrase
  19. phishing
  20. spam
  21. Cyber Security
  22. social engineering
  23. incident response
  24. packet
  25. botnet
  26. encryption
  27. firewall
  28. Cyber Defense
  29. Dark Web
  30. Defense-in-depth
  31. FTP
  32. spyware
  33. bug
  34. insider threat
  35. zero-day
  36. training
  37. IP
  38. HIPAA
  39. rootkit
  40. IoT
  41. confidentiality
  42. compliance
  43. password
  44. pentest
  45. antivirus
  46. PII
  47. spoofing
  48. risk
  49. virus
  50. exploit
  51. cyber attack
  52. security policy
  53. MFA
  54. IPS
  55. PHI
  56. VPN
  57. hacker
  58. network
  59. DDoS
  60. IDS
  61. defense evasion
  62. malware
  63. breach
  64. incident
  65. admin
  66. cryptography
  67. integrity
  68. security awareness
  69. resilience
  70. ransomware
  71. Security Operations