MalwarePatchupdateAdwarebackdoorFree!BlocklistingKeyloggerVirusPublicdataEncryptionPrivilegeescalationImpersonationZero-dayexploitDataclassificationSpoofeddomainAccesscontrolVPN(VirtualPrivateNetwork)FirewallCredentialstuffingDarkwebpenetrationtestingshadowITPasswordmanagerKeepervishingCompliancePhishingRansomwareCyberhygieneRole-basedaccesscontrolDatabreachMulti-factorauthentication(MFA)sandboxAcceptableUse PolicySpywareCleandeskpolicythreatactorendpointsecurityTailgatingconfidentialdataMisinformation(AI)RemediationTrainingattackvectorInsiderthreatsmishingZeroTrustSocialengineeringIncidentResponseTeamDDoS attack(DistributedDenial ofService)PhishAlertButton(PAB)TokenizationremovablemediaBusinessemailcompromise(BEC)PolicyViolationDigitalfootprintBYOD(BringYour OwnDevice)BruteforceattackspearphishingVulnerabilityDeepfakeSecurityauditIncidentresponseRole-basedtrainingAnnualsecuritytrainingRestricteddataRestrictedcountryMalwarePatchupdateAdwarebackdoorFree!BlocklistingKeyloggerVirusPublicdataEncryptionPrivilegeescalationImpersonationZero-dayexploitDataclassificationSpoofeddomainAccesscontrolVPN(VirtualPrivateNetwork)FirewallCredentialstuffingDarkwebpenetrationtestingshadowITPasswordmanagerKeepervishingCompliancePhishingRansomwareCyberhygieneRole-basedaccesscontrolDatabreachMulti-factorauthentication(MFA)sandboxAcceptableUse PolicySpywareCleandeskpolicythreatactorendpointsecurityTailgatingconfidentialdataMisinformation(AI)RemediationTrainingattackvectorInsiderthreatsmishingZeroTrustSocialengineeringIncidentResponseTeamDDoS attack(DistributedDenial ofService)PhishAlertButton(PAB)TokenizationremovablemediaBusinessemailcompromise(BEC)PolicyViolationDigitalfootprintBYOD(BringYour OwnDevice)BruteforceattackspearphishingVulnerabilityDeepfakeSecurityauditIncidentresponseRole-basedtrainingAnnualsecuritytrainingRestricteddataRestrictedcountry

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. Malware
  2. Patch update
  3. Adware
  4. backdoor
  5. Free!
  6. Blocklisting
  7. Keylogger
  8. Virus
  9. Public data
  10. Encryption
  11. Privilege escalation
  12. Impersonation
  13. Zero-day exploit
  14. Data classification
  15. Spoofed domain
  16. Access control
  17. VPN (Virtual Private Network)
  18. Firewall
  19. Credential stuffing
  20. Dark web
  21. penetration testing
  22. shadow IT
  23. Password manager
  24. Keeper
  25. vishing
  26. Compliance
  27. Phishing
  28. Ransomware
  29. Cyber hygiene
  30. Role-based access control
  31. Data breach
  32. Multi-factor authentication (MFA)
  33. sand box
  34. Acceptable Use Policy
  35. Spyware
  36. Clean desk policy
  37. threat actor
  38. endpoint security
  39. Tailgating
  40. confidential data
  41. Misinformation (AI)
  42. Remediation Training
  43. attack vector
  44. Insider threat
  45. smishing
  46. Zero Trust
  47. Social engineering
  48. Incident Response Team
  49. DDoS attack (Distributed Denial of Service)
  50. Phish Alert Button (PAB)
  51. Tokenization
  52. removable media
  53. Business email compromise (BEC)
  54. Policy Violation
  55. Digital footprint
  56. BYOD (Bring Your Own Device)
  57. Brute force attack
  58. spear phishing
  59. Vulnerability
  60. Deepfake
  61. Security audit
  62. Incident response
  63. Role-based training
  64. Annual security training
  65. Restricted data
  66. Restricted country