IDSincidentcryptographysecuritypolicytrainingFTPescalationmalwareSecurityOperationsantivirusIOCBECvulnerabilityadminsocialengineeringzero-dayEDRavailabilityinsiderthreatdefenseevasionPIIhackerfirewallphishingvirusspamintegritycyberattackAPTvishingIoTwormidentitytheftpentestencryptionIPIPSSyssecAdminsecurityawarenesssmishingspywarecompliancebotnetpasswordnetworkriskDDoSCIAtriadOSPHIspoofingincidentresponseMFAriskassessmentrootkitbreachDarkWebWISPpassphrasebugbusinesscontinuityDefense-in-depthHIPAAresilienceVPNpacketexploitransomwareCyberDefenseconfidentialityCyberSecurityIDSincidentcryptographysecuritypolicytrainingFTPescalationmalwareSecurityOperationsantivirusIOCBECvulnerabilityadminsocialengineeringzero-dayEDRavailabilityinsiderthreatdefenseevasionPIIhackerfirewallphishingvirusspamintegritycyberattackAPTvishingIoTwormidentitytheftpentestencryptionIPIPSSyssecAdminsecurityawarenesssmishingspywarecompliancebotnetpasswordnetworkriskDDoSCIAtriadOSPHIspoofingincidentresponseMFAriskassessmentrootkitbreachDarkWebWISPpassphrasebugbusinesscontinuityDefense-in-depthHIPAAresilienceVPNpacketexploitransomwareCyberDefenseconfidentialityCyberSecurity

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. IDS
  2. incident
  3. cryptography
  4. security policy
  5. training
  6. FTP
  7. escalation
  8. malware
  9. Security Operations
  10. antivirus
  11. IOC
  12. BEC
  13. vulnerability
  14. admin
  15. social engineering
  16. zero-day
  17. EDR
  18. availability
  19. insider threat
  20. defense evasion
  21. PII
  22. hacker
  23. firewall
  24. phishing
  25. virus
  26. spam
  27. integrity
  28. cyber attack
  29. APT
  30. vishing
  31. IoT
  32. worm
  33. identity theft
  34. pentest
  35. encryption
  36. IP
  37. IPS
  38. SyssecAdmin
  39. security awareness
  40. smishing
  41. spyware
  42. compliance
  43. botnet
  44. password
  45. network
  46. risk
  47. DDoS
  48. CIA triad
  49. OS
  50. PHI
  51. spoofing
  52. incident response
  53. MFA
  54. risk assessment
  55. rootkit
  56. breach
  57. Dark Web
  58. WISP
  59. passphrase
  60. bug
  61. business continuity
  62. Defense-in-depth
  63. HIPAA
  64. resilience
  65. VPN
  66. packet
  67. exploit
  68. ransomware
  69. Cyber Defense
  70. confidentiality
  71. Cyber Security