AdwaresandboxDatabreachIncidentresponseAcceptableUse PolicyPublicdataKeyloggerVirusattackvectorthreatactorMulti-factorauthentication(MFA)PasswordmanagerSocialengineeringCompliancePolicyViolationIncidentResponseTeamRestrictedcountryAnnualsecuritytrainingZero-dayexploitconfidentialdataDeepfakeDDoS attack(DistributedDenial ofService)TailgatingshadowITDarkwebRole-basedaccesscontrolCyberhygienePatchupdateTokenizationendpointsecurityPhishingVPN(VirtualPrivateNetwork)RansomwareFree!ImpersonationBYOD(BringYour OwnDevice)PhishAlertButton(PAB)penetrationtestingRestricteddataSpywareZeroTrustvishingKeeperBusinessemailcompromise(BEC)InsiderthreatVulnerabilitysmishingFirewallCredentialstuffingremovablemediaPrivilegeescalationBruteforceattackSecurityauditCleandeskpolicybackdoorEncryptionAccesscontrolMisinformation(AI)BlocklistingspearphishingRemediationTrainingDigitalfootprintMalwareDataclassificationSpoofeddomainRole-basedtrainingAdwaresandboxDatabreachIncidentresponseAcceptableUse PolicyPublicdataKeyloggerVirusattackvectorthreatactorMulti-factorauthentication(MFA)PasswordmanagerSocialengineeringCompliancePolicyViolationIncidentResponseTeamRestrictedcountryAnnualsecuritytrainingZero-dayexploitconfidentialdataDeepfakeDDoS attack(DistributedDenial ofService)TailgatingshadowITDarkwebRole-basedaccesscontrolCyberhygienePatchupdateTokenizationendpointsecurityPhishingVPN(VirtualPrivateNetwork)RansomwareFree!ImpersonationBYOD(BringYour OwnDevice)PhishAlertButton(PAB)penetrationtestingRestricteddataSpywareZeroTrustvishingKeeperBusinessemailcompromise(BEC)InsiderthreatVulnerabilitysmishingFirewallCredentialstuffingremovablemediaPrivilegeescalationBruteforceattackSecurityauditCleandeskpolicybackdoorEncryptionAccesscontrolMisinformation(AI)BlocklistingspearphishingRemediationTrainingDigitalfootprintMalwareDataclassificationSpoofeddomainRole-basedtraining

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. Adware
  2. sand box
  3. Data breach
  4. Incident response
  5. Acceptable Use Policy
  6. Public data
  7. Keylogger
  8. Virus
  9. attack vector
  10. threat actor
  11. Multi-factor authentication (MFA)
  12. Password manager
  13. Social engineering
  14. Compliance
  15. Policy Violation
  16. Incident Response Team
  17. Restricted country
  18. Annual security training
  19. Zero-day exploit
  20. confidential data
  21. Deepfake
  22. DDoS attack (Distributed Denial of Service)
  23. Tailgating
  24. shadow IT
  25. Dark web
  26. Role-based access control
  27. Cyber hygiene
  28. Patch update
  29. Tokenization
  30. endpoint security
  31. Phishing
  32. VPN (Virtual Private Network)
  33. Ransomware
  34. Free!
  35. Impersonation
  36. BYOD (Bring Your Own Device)
  37. Phish Alert Button (PAB)
  38. penetration testing
  39. Restricted data
  40. Spyware
  41. Zero Trust
  42. vishing
  43. Keeper
  44. Business email compromise (BEC)
  45. Insider threat
  46. Vulnerability
  47. smishing
  48. Firewall
  49. Credential stuffing
  50. removable media
  51. Privilege escalation
  52. Brute force attack
  53. Security audit
  54. Clean desk policy
  55. backdoor
  56. Encryption
  57. Access control
  58. Misinformation (AI)
  59. Blocklisting
  60. spear phishing
  61. Remediation Training
  62. Digital footprint
  63. Malware
  64. Data classification
  65. Spoofed domain
  66. Role-based training