Multi-factorauthentication(MFA)shadowITMalwareComplianceBYOD(BringYour OwnDevice)AccesscontrolspearphishingPhishAlertButton(PAB)KeyloggerattackvectorZeroTrustPhishingRansomwareDataclassificationVulnerabilityPatchupdateTailgatingDarkwebFirewallRole-basedaccesscontrolCyberhygienePolicyViolationDigitalfootprintIncidentresponseKeeperRestrictedcountryendpointsecurityCleandeskpolicyAdwareAnnualsecuritytrainingVirusRole-basedtrainingvishingconfidentialdataIncidentResponseTeamBlocklistingSecurityauditDatabreachEncryptionZero-dayexploitBusinessemailcompromise(BEC)CredentialstuffingRestricteddataFree!BruteforceattackPrivilegeescalationpenetrationtestingthreatactorInsiderthreatSocialengineeringDeepfakeDDoS attack(DistributedDenial ofService)RemediationTrainingPasswordmanagerMisinformation(AI)PublicdataSpywaresmishingbackdoorremovablemediaTokenizationSpoofeddomainImpersonationAcceptableUse PolicysandboxVPN(VirtualPrivateNetwork)Multi-factorauthentication(MFA)shadowITMalwareComplianceBYOD(BringYour OwnDevice)AccesscontrolspearphishingPhishAlertButton(PAB)KeyloggerattackvectorZeroTrustPhishingRansomwareDataclassificationVulnerabilityPatchupdateTailgatingDarkwebFirewallRole-basedaccesscontrolCyberhygienePolicyViolationDigitalfootprintIncidentresponseKeeperRestrictedcountryendpointsecurityCleandeskpolicyAdwareAnnualsecuritytrainingVirusRole-basedtrainingvishingconfidentialdataIncidentResponseTeamBlocklistingSecurityauditDatabreachEncryptionZero-dayexploitBusinessemailcompromise(BEC)CredentialstuffingRestricteddataFree!BruteforceattackPrivilegeescalationpenetrationtestingthreatactorInsiderthreatSocialengineeringDeepfakeDDoS attack(DistributedDenial ofService)RemediationTrainingPasswordmanagerMisinformation(AI)PublicdataSpywaresmishingbackdoorremovablemediaTokenizationSpoofeddomainImpersonationAcceptableUse PolicysandboxVPN(VirtualPrivateNetwork)

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. Multi-factor authentication (MFA)
  2. shadow IT
  3. Malware
  4. Compliance
  5. BYOD (Bring Your Own Device)
  6. Access control
  7. spear phishing
  8. Phish Alert Button (PAB)
  9. Keylogger
  10. attack vector
  11. Zero Trust
  12. Phishing
  13. Ransomware
  14. Data classification
  15. Vulnerability
  16. Patch update
  17. Tailgating
  18. Dark web
  19. Firewall
  20. Role-based access control
  21. Cyber hygiene
  22. Policy Violation
  23. Digital footprint
  24. Incident response
  25. Keeper
  26. Restricted country
  27. endpoint security
  28. Clean desk policy
  29. Adware
  30. Annual security training
  31. Virus
  32. Role-based training
  33. vishing
  34. confidential data
  35. Incident Response Team
  36. Blocklisting
  37. Security audit
  38. Data breach
  39. Encryption
  40. Zero-day exploit
  41. Business email compromise (BEC)
  42. Credential stuffing
  43. Restricted data
  44. Free!
  45. Brute force attack
  46. Privilege escalation
  47. penetration testing
  48. threat actor
  49. Insider threat
  50. Social engineering
  51. Deepfake
  52. DDoS attack (Distributed Denial of Service)
  53. Remediation Training
  54. Password manager
  55. Misinformation (AI)
  56. Public data
  57. Spyware
  58. smishing
  59. backdoor
  60. removable media
  61. Tokenization
  62. Spoofed domain
  63. Impersonation
  64. Acceptable Use Policy
  65. sand box
  66. VPN (Virtual Private Network)