SecurityauditPatchupdatespearphishingKeyloggerCredentialstuffingRole-basedtrainingPhishAlertButton(PAB)BYOD(BringYour OwnDevice)Free!Misinformation(AI)attackvectorremovablemediaMalwarevishingshadowITsmishingPhishingVulnerabilitySpoofeddomainFirewallDarkwebpenetrationtestingBusinessemailcompromise(BEC)AdwareRansomwareEncryptionPasswordmanagerCompliancePrivilegeescalationAcceptableUse PolicyDataclassificationInsiderthreatBruteforceattackthreatactorRestricteddataTokenizationPublicdataVPN(VirtualPrivateNetwork)IncidentresponseZeroTrustDigitalfootprintRestrictedcountryRole-basedaccesscontrolBlocklistingDDoS attack(DistributedDenial ofService)backdoorPolicyViolationCleandeskpolicyAnnualsecuritytrainingendpointsecurityDatabreachImpersonationSpywaresandboxKeeperconfidentialdataVirusCyberhygieneTailgatingIncidentResponseTeamDeepfakeZero-dayexploitMulti-factorauthentication(MFA)AccesscontrolSocialengineeringRemediationTrainingSecurityauditPatchupdatespearphishingKeyloggerCredentialstuffingRole-basedtrainingPhishAlertButton(PAB)BYOD(BringYour OwnDevice)Free!Misinformation(AI)attackvectorremovablemediaMalwarevishingshadowITsmishingPhishingVulnerabilitySpoofeddomainFirewallDarkwebpenetrationtestingBusinessemailcompromise(BEC)AdwareRansomwareEncryptionPasswordmanagerCompliancePrivilegeescalationAcceptableUse PolicyDataclassificationInsiderthreatBruteforceattackthreatactorRestricteddataTokenizationPublicdataVPN(VirtualPrivateNetwork)IncidentresponseZeroTrustDigitalfootprintRestrictedcountryRole-basedaccesscontrolBlocklistingDDoS attack(DistributedDenial ofService)backdoorPolicyViolationCleandeskpolicyAnnualsecuritytrainingendpointsecurityDatabreachImpersonationSpywaresandboxKeeperconfidentialdataVirusCyberhygieneTailgatingIncidentResponseTeamDeepfakeZero-dayexploitMulti-factorauthentication(MFA)AccesscontrolSocialengineeringRemediationTraining

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. Security audit
  2. Patch update
  3. spear phishing
  4. Keylogger
  5. Credential stuffing
  6. Role-based training
  7. Phish Alert Button (PAB)
  8. BYOD (Bring Your Own Device)
  9. Free!
  10. Misinformation (AI)
  11. attack vector
  12. removable media
  13. Malware
  14. vishing
  15. shadow IT
  16. smishing
  17. Phishing
  18. Vulnerability
  19. Spoofed domain
  20. Firewall
  21. Dark web
  22. penetration testing
  23. Business email compromise (BEC)
  24. Adware
  25. Ransomware
  26. Encryption
  27. Password manager
  28. Compliance
  29. Privilege escalation
  30. Acceptable Use Policy
  31. Data classification
  32. Insider threat
  33. Brute force attack
  34. threat actor
  35. Restricted data
  36. Tokenization
  37. Public data
  38. VPN (Virtual Private Network)
  39. Incident response
  40. Zero Trust
  41. Digital footprint
  42. Restricted country
  43. Role-based access control
  44. Blocklisting
  45. DDoS attack (Distributed Denial of Service)
  46. backdoor
  47. Policy Violation
  48. Clean desk policy
  49. Annual security training
  50. endpoint security
  51. Data breach
  52. Impersonation
  53. Spyware
  54. sand box
  55. Keeper
  56. confidential data
  57. Virus
  58. Cyber hygiene
  59. Tailgating
  60. Incident Response Team
  61. Deepfake
  62. Zero-day exploit
  63. Multi-factor authentication (MFA)
  64. Access control
  65. Social engineering
  66. Remediation Training