IPavailabilityMFAresiliencetrainingWISPincidentsocialengineeringIoTriskassessmentsecurityawarenesspassphraseconfidentialityOSvishingwormSyssecAdminransomwarebugrootkitDefense-in-depthHIPAApentestPIIhackerpasswordinsiderthreatintegrityencryptionphishingIDSvirusfirewallincidentresponseIPSmalwareIOCsecuritypolicycryptographybusinesscontinuitybreachVPNDDoSadminnetworkspoofingDarkWebcyberattackvulnerabilityCyberDefenseantivirusidentitytheftPHIpacketspamexploitcompliancesmishingCyberSecurityspywareescalationFTPAPTbotnetdefenseevasionCIAtriadEDRBECSecurityOperationszero-dayriskIPavailabilityMFAresiliencetrainingWISPincidentsocialengineeringIoTriskassessmentsecurityawarenesspassphraseconfidentialityOSvishingwormSyssecAdminransomwarebugrootkitDefense-in-depthHIPAApentestPIIhackerpasswordinsiderthreatintegrityencryptionphishingIDSvirusfirewallincidentresponseIPSmalwareIOCsecuritypolicycryptographybusinesscontinuitybreachVPNDDoSadminnetworkspoofingDarkWebcyberattackvulnerabilityCyberDefenseantivirusidentitytheftPHIpacketspamexploitcompliancesmishingCyberSecurityspywareescalationFTPAPTbotnetdefenseevasionCIAtriadEDRBECSecurityOperationszero-dayrisk

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. IP
  2. availability
  3. MFA
  4. resilience
  5. training
  6. WISP
  7. incident
  8. social engineering
  9. IoT
  10. risk assessment
  11. security awareness
  12. passphrase
  13. confidentiality
  14. OS
  15. vishing
  16. worm
  17. SyssecAdmin
  18. ransomware
  19. bug
  20. rootkit
  21. Defense-in-depth
  22. HIPAA
  23. pentest
  24. PII
  25. hacker
  26. password
  27. insider threat
  28. integrity
  29. encryption
  30. phishing
  31. IDS
  32. virus
  33. firewall
  34. incident response
  35. IPS
  36. malware
  37. IOC
  38. security policy
  39. cryptography
  40. business continuity
  41. breach
  42. VPN
  43. DDoS
  44. admin
  45. network
  46. spoofing
  47. Dark Web
  48. cyber attack
  49. vulnerability
  50. Cyber Defense
  51. antivirus
  52. identity theft
  53. PHI
  54. packet
  55. spam
  56. exploit
  57. compliance
  58. smishing
  59. Cyber Security
  60. spyware
  61. escalation
  62. FTP
  63. APT
  64. botnet
  65. defense evasion
  66. CIA triad
  67. EDR
  68. BEC
  69. Security Operations
  70. zero-day
  71. risk