PhishAlertButton(PAB)shadowITEncryptionVPN(VirtualPrivateNetwork)spearphishingDigitalfootprintVirusSpywareBruteforceattacksmishingCyberhygieneMisinformation(AI)CleandeskpolicyInsiderthreatPatchupdatevishingIncidentresponseTailgatingRestricteddataAnnualsecuritytrainingSocialengineeringCredentialstuffingKeeperVulnerabilityendpointsecurityMulti-factorauthentication(MFA)RansomwareZero-dayexploitRole-basedtrainingBlocklistingIncidentResponseTeamMalwareFirewallImpersonationDeepfakeFree!AcceptableUse PolicyBYOD(BringYour OwnDevice)ZeroTrustSpoofeddomainbackdoorDatabreachPublicdataAccesscontrolRole-basedaccesscontrolSecurityauditPhishingattackvectorKeyloggerthreatactorconfidentialdataPasswordmanagerDarkwebRestrictedcountryDataclassificationpenetrationtestingComplianceremovablemediaRemediationTrainingDDoS attack(DistributedDenial ofService)sandboxBusinessemailcompromise(BEC)PrivilegeescalationAdwarePolicyViolationTokenizationPhishAlertButton(PAB)shadowITEncryptionVPN(VirtualPrivateNetwork)spearphishingDigitalfootprintVirusSpywareBruteforceattacksmishingCyberhygieneMisinformation(AI)CleandeskpolicyInsiderthreatPatchupdatevishingIncidentresponseTailgatingRestricteddataAnnualsecuritytrainingSocialengineeringCredentialstuffingKeeperVulnerabilityendpointsecurityMulti-factorauthentication(MFA)RansomwareZero-dayexploitRole-basedtrainingBlocklistingIncidentResponseTeamMalwareFirewallImpersonationDeepfakeFree!AcceptableUse PolicyBYOD(BringYour OwnDevice)ZeroTrustSpoofeddomainbackdoorDatabreachPublicdataAccesscontrolRole-basedaccesscontrolSecurityauditPhishingattackvectorKeyloggerthreatactorconfidentialdataPasswordmanagerDarkwebRestrictedcountryDataclassificationpenetrationtestingComplianceremovablemediaRemediationTrainingDDoS attack(DistributedDenial ofService)sandboxBusinessemailcompromise(BEC)PrivilegeescalationAdwarePolicyViolationTokenization

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. Phish Alert Button (PAB)
  2. shadow IT
  3. Encryption
  4. VPN (Virtual Private Network)
  5. spear phishing
  6. Digital footprint
  7. Virus
  8. Spyware
  9. Brute force attack
  10. smishing
  11. Cyber hygiene
  12. Misinformation (AI)
  13. Clean desk policy
  14. Insider threat
  15. Patch update
  16. vishing
  17. Incident response
  18. Tailgating
  19. Restricted data
  20. Annual security training
  21. Social engineering
  22. Credential stuffing
  23. Keeper
  24. Vulnerability
  25. endpoint security
  26. Multi-factor authentication (MFA)
  27. Ransomware
  28. Zero-day exploit
  29. Role-based training
  30. Blocklisting
  31. Incident Response Team
  32. Malware
  33. Firewall
  34. Impersonation
  35. Deepfake
  36. Free!
  37. Acceptable Use Policy
  38. BYOD (Bring Your Own Device)
  39. Zero Trust
  40. Spoofed domain
  41. backdoor
  42. Data breach
  43. Public data
  44. Access control
  45. Role-based access control
  46. Security audit
  47. Phishing
  48. attack vector
  49. Keylogger
  50. threat actor
  51. confidential data
  52. Password manager
  53. Dark web
  54. Restricted country
  55. Data classification
  56. penetration testing
  57. Compliance
  58. removable media
  59. Remediation Training
  60. DDoS attack (Distributed Denial of Service)
  61. sand box
  62. Business email compromise (BEC)
  63. Privilege escalation
  64. Adware
  65. Policy Violation
  66. Tokenization