VPNransomwareCyberDefenseintegrityescalationWISPOSCyberSecuritycryptographyfirewallcyberattackmalwareHIPAAbusinesscontinuitySyssecAdminIoTincidentresponsepentestphishingvishingDefense-in-depthriskassessmentvirusadminhackerbotnetbugnetworkvulnerabilitybreachDDoSAPTantivirusconfidentialityspamencryptionPIICIAtriadspoofingDarkWebBECPHIidentitytheftpassphraseresilienceinsiderthreatFTProotkitzero-daycompliancesmishingwormpacketMFASecurityOperationssocialengineeringavailabilityEDRtrainingrisksecurityawarenessexploitIPspywareincidentpasswordIOCsecuritypolicyIDSIPSdefenseevasionVPNransomwareCyberDefenseintegrityescalationWISPOSCyberSecuritycryptographyfirewallcyberattackmalwareHIPAAbusinesscontinuitySyssecAdminIoTincidentresponsepentestphishingvishingDefense-in-depthriskassessmentvirusadminhackerbotnetbugnetworkvulnerabilitybreachDDoSAPTantivirusconfidentialityspamencryptionPIICIAtriadspoofingDarkWebBECPHIidentitytheftpassphraseresilienceinsiderthreatFTProotkitzero-daycompliancesmishingwormpacketMFASecurityOperationssocialengineeringavailabilityEDRtrainingrisksecurityawarenessexploitIPspywareincidentpasswordIOCsecuritypolicyIDSIPSdefenseevasion

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. VPN
  2. ransomware
  3. Cyber Defense
  4. integrity
  5. escalation
  6. WISP
  7. OS
  8. Cyber Security
  9. cryptography
  10. firewall
  11. cyber attack
  12. malware
  13. HIPAA
  14. business continuity
  15. SyssecAdmin
  16. IoT
  17. incident response
  18. pentest
  19. phishing
  20. vishing
  21. Defense-in-depth
  22. risk assessment
  23. virus
  24. admin
  25. hacker
  26. botnet
  27. bug
  28. network
  29. vulnerability
  30. breach
  31. DDoS
  32. APT
  33. antivirus
  34. confidentiality
  35. spam
  36. encryption
  37. PII
  38. CIA triad
  39. spoofing
  40. Dark Web
  41. BEC
  42. PHI
  43. identity theft
  44. passphrase
  45. resilience
  46. insider threat
  47. FTP
  48. rootkit
  49. zero-day
  50. compliance
  51. smishing
  52. worm
  53. packet
  54. MFA
  55. Security Operations
  56. social engineering
  57. availability
  58. EDR
  59. training
  60. risk
  61. security awareness
  62. exploit
  63. IP
  64. spyware
  65. incident
  66. password
  67. IOC
  68. security policy
  69. IDS
  70. IPS
  71. defense evasion