sandboxZero-dayexploitMulti-factorauthentication(MFA)VirusshadowITAcceptableUse PolicyBYOD(BringYour OwnDevice)DigitalfootprintIncidentresponseBusinessemailcompromise(BEC)DatabreachFirewallSocialengineeringRole-basedaccesscontrolremovablemediaattackvectorconfidentialdataKeeperPrivilegeescalationRestrictedcountryDarkwebspearphishingthreatactorpenetrationtestingZeroTrustDataclassificationPasswordmanagerTailgatingCyberhygienePhishingvishingAccesscontrolPhishAlertButton(PAB)AdwareBruteforceattackCompliancebackdoorPolicyViolationVPN(VirtualPrivateNetwork)Role-basedtrainingPatchupdateendpointsecurityEncryptionDDoS attack(DistributedDenial ofService)smishingTokenizationRansomwareKeyloggerMalwareInsiderthreatCleandeskpolicyAnnualsecuritytrainingImpersonationSpywareMisinformation(AI)SpoofeddomainDeepfakeRestricteddataRemediationTrainingSecurityauditVulnerabilityPublicdataCredentialstuffingIncidentResponseTeamBlocklistingFree!sandboxZero-dayexploitMulti-factorauthentication(MFA)VirusshadowITAcceptableUse PolicyBYOD(BringYour OwnDevice)DigitalfootprintIncidentresponseBusinessemailcompromise(BEC)DatabreachFirewallSocialengineeringRole-basedaccesscontrolremovablemediaattackvectorconfidentialdataKeeperPrivilegeescalationRestrictedcountryDarkwebspearphishingthreatactorpenetrationtestingZeroTrustDataclassificationPasswordmanagerTailgatingCyberhygienePhishingvishingAccesscontrolPhishAlertButton(PAB)AdwareBruteforceattackCompliancebackdoorPolicyViolationVPN(VirtualPrivateNetwork)Role-basedtrainingPatchupdateendpointsecurityEncryptionDDoS attack(DistributedDenial ofService)smishingTokenizationRansomwareKeyloggerMalwareInsiderthreatCleandeskpolicyAnnualsecuritytrainingImpersonationSpywareMisinformation(AI)SpoofeddomainDeepfakeRestricteddataRemediationTrainingSecurityauditVulnerabilityPublicdataCredentialstuffingIncidentResponseTeamBlocklistingFree!

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. sand box
  2. Zero-day exploit
  3. Multi-factor authentication (MFA)
  4. Virus
  5. shadow IT
  6. Acceptable Use Policy
  7. BYOD (Bring Your Own Device)
  8. Digital footprint
  9. Incident response
  10. Business email compromise (BEC)
  11. Data breach
  12. Firewall
  13. Social engineering
  14. Role-based access control
  15. removable media
  16. attack vector
  17. confidential data
  18. Keeper
  19. Privilege escalation
  20. Restricted country
  21. Dark web
  22. spear phishing
  23. threat actor
  24. penetration testing
  25. Zero Trust
  26. Data classification
  27. Password manager
  28. Tailgating
  29. Cyber hygiene
  30. Phishing
  31. vishing
  32. Access control
  33. Phish Alert Button (PAB)
  34. Adware
  35. Brute force attack
  36. Compliance
  37. backdoor
  38. Policy Violation
  39. VPN (Virtual Private Network)
  40. Role-based training
  41. Patch update
  42. endpoint security
  43. Encryption
  44. DDoS attack (Distributed Denial of Service)
  45. smishing
  46. Tokenization
  47. Ransomware
  48. Keylogger
  49. Malware
  50. Insider threat
  51. Clean desk policy
  52. Annual security training
  53. Impersonation
  54. Spyware
  55. Misinformation (AI)
  56. Spoofed domain
  57. Deepfake
  58. Restricted data
  59. Remediation Training
  60. Security audit
  61. Vulnerability
  62. Public data
  63. Credential stuffing
  64. Incident Response Team
  65. Blocklisting
  66. Free!