spywareencryptionPHISecurityOperationszero-dayransomwarecomplianceIDSVPNriskassessmentnetworkDarkWebIPbreachidentitytheftWISPFTPmalwareMFApassphrasespoofingCyberSecurityavailabilityincidentSyssecAdminvulnerabilityescalationresilienceIOCOSadminhackervirusriskvishingsmishingtrainingsecuritypolicysocialengineeringconfidentialitydefenseevasionHIPAAbusinesscontinuitysecurityawarenessEDRrootkitincidentresponseIPSAPTcyberattackpasswordDefense-in-depthfirewallDDoSBECbotnetCIAtriadIoTspampacketintegritybugwormantiviruspentestCyberDefensephishinginsiderthreatcryptographyexploitPIIspywareencryptionPHISecurityOperationszero-dayransomwarecomplianceIDSVPNriskassessmentnetworkDarkWebIPbreachidentitytheftWISPFTPmalwareMFApassphrasespoofingCyberSecurityavailabilityincidentSyssecAdminvulnerabilityescalationresilienceIOCOSadminhackervirusriskvishingsmishingtrainingsecuritypolicysocialengineeringconfidentialitydefenseevasionHIPAAbusinesscontinuitysecurityawarenessEDRrootkitincidentresponseIPSAPTcyberattackpasswordDefense-in-depthfirewallDDoSBECbotnetCIAtriadIoTspampacketintegritybugwormantiviruspentestCyberDefensephishinginsiderthreatcryptographyexploitPII

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. spyware
  2. encryption
  3. PHI
  4. Security Operations
  5. zero-day
  6. ransomware
  7. compliance
  8. IDS
  9. VPN
  10. risk assessment
  11. network
  12. Dark Web
  13. IP
  14. breach
  15. identity theft
  16. WISP
  17. FTP
  18. malware
  19. MFA
  20. passphrase
  21. spoofing
  22. Cyber Security
  23. availability
  24. incident
  25. SyssecAdmin
  26. vulnerability
  27. escalation
  28. resilience
  29. IOC
  30. OS
  31. admin
  32. hacker
  33. virus
  34. risk
  35. vishing
  36. smishing
  37. training
  38. security policy
  39. social engineering
  40. confidentiality
  41. defense evasion
  42. HIPAA
  43. business continuity
  44. security awareness
  45. EDR
  46. rootkit
  47. incident response
  48. IPS
  49. APT
  50. cyber attack
  51. password
  52. Defense-in-depth
  53. firewall
  54. DDoS
  55. BEC
  56. botnet
  57. CIA triad
  58. IoT
  59. spam
  60. packet
  61. integrity
  62. bug
  63. worm
  64. antivirus
  65. pentest
  66. Cyber Defense
  67. phishing
  68. insider threat
  69. cryptography
  70. exploit
  71. PII