DeepfakeDigitalfootprintDatabreachFirewallImpersonationBusinessemailcompromise(BEC)PrivilegeescalationInsiderthreatKeeperPatchupdateCredentialstuffingSpoofeddomainvishingPasswordmanagerpenetrationtestingSocialengineeringshadowITPublicdataRestrictedcountrysandboxremovablemediaVulnerabilityRole-basedaccesscontrolIncidentResponseTeamSpywareRemediationTrainingattackvectorMisinformation(AI)RansomwareTailgatingBruteforceattackthreatactorEncryptionAdwareZero-dayexploitKeyloggersmishingDarkwebspearphishingRestricteddataMulti-factorauthentication(MFA)AccesscontrolAcceptableUse PolicyZeroTrustMalwareIncidentresponseCleandeskpolicyVPN(VirtualPrivateNetwork)Role-basedtrainingendpointsecurityCyberhygieneDataclassificationBlocklistingconfidentialdataVirusTokenizationFree!backdoorDDoS attack(DistributedDenial ofService)PhishAlertButton(PAB)AnnualsecuritytrainingPhishingSecurityauditBYOD(BringYour OwnDevice)PolicyViolationComplianceDeepfakeDigitalfootprintDatabreachFirewallImpersonationBusinessemailcompromise(BEC)PrivilegeescalationInsiderthreatKeeperPatchupdateCredentialstuffingSpoofeddomainvishingPasswordmanagerpenetrationtestingSocialengineeringshadowITPublicdataRestrictedcountrysandboxremovablemediaVulnerabilityRole-basedaccesscontrolIncidentResponseTeamSpywareRemediationTrainingattackvectorMisinformation(AI)RansomwareTailgatingBruteforceattackthreatactorEncryptionAdwareZero-dayexploitKeyloggersmishingDarkwebspearphishingRestricteddataMulti-factorauthentication(MFA)AccesscontrolAcceptableUse PolicyZeroTrustMalwareIncidentresponseCleandeskpolicyVPN(VirtualPrivateNetwork)Role-basedtrainingendpointsecurityCyberhygieneDataclassificationBlocklistingconfidentialdataVirusTokenizationFree!backdoorDDoS attack(DistributedDenial ofService)PhishAlertButton(PAB)AnnualsecuritytrainingPhishingSecurityauditBYOD(BringYour OwnDevice)PolicyViolationCompliance

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. Deepfake
  2. Digital footprint
  3. Data breach
  4. Firewall
  5. Impersonation
  6. Business email compromise (BEC)
  7. Privilege escalation
  8. Insider threat
  9. Keeper
  10. Patch update
  11. Credential stuffing
  12. Spoofed domain
  13. vishing
  14. Password manager
  15. penetration testing
  16. Social engineering
  17. shadow IT
  18. Public data
  19. Restricted country
  20. sand box
  21. removable media
  22. Vulnerability
  23. Role-based access control
  24. Incident Response Team
  25. Spyware
  26. Remediation Training
  27. attack vector
  28. Misinformation (AI)
  29. Ransomware
  30. Tailgating
  31. Brute force attack
  32. threat actor
  33. Encryption
  34. Adware
  35. Zero-day exploit
  36. Keylogger
  37. smishing
  38. Dark web
  39. spear phishing
  40. Restricted data
  41. Multi-factor authentication (MFA)
  42. Access control
  43. Acceptable Use Policy
  44. Zero Trust
  45. Malware
  46. Incident response
  47. Clean desk policy
  48. VPN (Virtual Private Network)
  49. Role-based training
  50. endpoint security
  51. Cyber hygiene
  52. Data classification
  53. Blocklisting
  54. confidential data
  55. Virus
  56. Tokenization
  57. Free!
  58. backdoor
  59. DDoS attack (Distributed Denial of Service)
  60. Phish Alert Button (PAB)
  61. Annual security training
  62. Phishing
  63. Security audit
  64. BYOD (Bring Your Own Device)
  65. Policy Violation
  66. Compliance