availabilityhackervishingHIPAACIAtriadSyssecAdminDefense-in-depthpassphraseEDRfirewallvulnerabilitytrainingcyberattackantivirusincidentresponseransomwaresecurityawarenessDDoSphishingzero-dayIOCspamidentitytheftFTPspoofingSecurityOperationsCyberDefensepacketMFAwormvirusbreachconfidentialitycompliancepasswordsmishingsecuritypolicyWISPbotnetintegrityencryptionadminBECmalwarebusinesscontinuityDarkWebsocialengineeringexploitresiliencecryptographyPHIOSPIIescalationspywareAPTIPIPSriskriskassessmentCyberSecuritynetworkrootkitdefenseevasionVPNinsiderthreatIoTIDSincidentbugpentestavailabilityhackervishingHIPAACIAtriadSyssecAdminDefense-in-depthpassphraseEDRfirewallvulnerabilitytrainingcyberattackantivirusincidentresponseransomwaresecurityawarenessDDoSphishingzero-dayIOCspamidentitytheftFTPspoofingSecurityOperationsCyberDefensepacketMFAwormvirusbreachconfidentialitycompliancepasswordsmishingsecuritypolicyWISPbotnetintegrityencryptionadminBECmalwarebusinesscontinuityDarkWebsocialengineeringexploitresiliencecryptographyPHIOSPIIescalationspywareAPTIPIPSriskriskassessmentCyberSecuritynetworkrootkitdefenseevasionVPNinsiderthreatIoTIDSincidentbugpentest

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. availability
  2. hacker
  3. vishing
  4. HIPAA
  5. CIA triad
  6. SyssecAdmin
  7. Defense-in-depth
  8. passphrase
  9. EDR
  10. firewall
  11. vulnerability
  12. training
  13. cyber attack
  14. antivirus
  15. incident response
  16. ransomware
  17. security awareness
  18. DDoS
  19. phishing
  20. zero-day
  21. IOC
  22. spam
  23. identity theft
  24. FTP
  25. spoofing
  26. Security Operations
  27. Cyber Defense
  28. packet
  29. MFA
  30. worm
  31. virus
  32. breach
  33. confidentiality
  34. compliance
  35. password
  36. smishing
  37. security policy
  38. WISP
  39. botnet
  40. integrity
  41. encryption
  42. admin
  43. BEC
  44. malware
  45. business continuity
  46. Dark Web
  47. social engineering
  48. exploit
  49. resilience
  50. cryptography
  51. PHI
  52. OS
  53. PII
  54. escalation
  55. spyware
  56. APT
  57. IP
  58. IPS
  59. risk
  60. risk assessment
  61. Cyber Security
  62. network
  63. rootkit
  64. defense evasion
  65. VPN
  66. insider threat
  67. IoT
  68. IDS
  69. incident
  70. bug
  71. pentest