BruteforceattackRole-basedtrainingAcceptableUse PolicyVulnerabilityMalwareComplianceZeroTrustspearphishingIncidentResponseTeamRemediationTrainingthreatactorTokenizationPublicdataVirusMulti-factorauthentication(MFA)ImpersonationPasswordmanagerPrivilegeescalationMisinformation(AI)RestricteddataCleandeskpolicyEncryptionPolicyViolationVPN(VirtualPrivateNetwork)Businessemailcompromise(BEC)DDoS attack(DistributedDenial ofService)DeepfakeconfidentialdataDataclassificationsmishingattackvectorAdwareDigitalfootprintKeyloggerRestrictedcountryPatchupdateendpointsecurityremovablemediapenetrationtestingTailgatingKeepershadowITCyberhygieneRole-basedaccesscontrolDarkwebCredentialstuffingRansomwareFirewallInsiderthreatSocialengineeringDatabreachPhishAlertButton(PAB)IncidentresponsePhishingFree!SecurityauditbackdoorAnnualsecuritytrainingAccesscontrolvishingsandboxBYOD(BringYour OwnDevice)BlocklistingZero-dayexploitSpoofeddomainSpywareBruteforceattackRole-basedtrainingAcceptableUse PolicyVulnerabilityMalwareComplianceZeroTrustspearphishingIncidentResponseTeamRemediationTrainingthreatactorTokenizationPublicdataVirusMulti-factorauthentication(MFA)ImpersonationPasswordmanagerPrivilegeescalationMisinformation(AI)RestricteddataCleandeskpolicyEncryptionPolicyViolationVPN(VirtualPrivateNetwork)Businessemailcompromise(BEC)DDoS attack(DistributedDenial ofService)DeepfakeconfidentialdataDataclassificationsmishingattackvectorAdwareDigitalfootprintKeyloggerRestrictedcountryPatchupdateendpointsecurityremovablemediapenetrationtestingTailgatingKeepershadowITCyberhygieneRole-basedaccesscontrolDarkwebCredentialstuffingRansomwareFirewallInsiderthreatSocialengineeringDatabreachPhishAlertButton(PAB)IncidentresponsePhishingFree!SecurityauditbackdoorAnnualsecuritytrainingAccesscontrolvishingsandboxBYOD(BringYour OwnDevice)BlocklistingZero-dayexploitSpoofeddomainSpyware

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. Brute force attack
  2. Role-based training
  3. Acceptable Use Policy
  4. Vulnerability
  5. Malware
  6. Compliance
  7. Zero Trust
  8. spear phishing
  9. Incident Response Team
  10. Remediation Training
  11. threat actor
  12. Tokenization
  13. Public data
  14. Virus
  15. Multi-factor authentication (MFA)
  16. Impersonation
  17. Password manager
  18. Privilege escalation
  19. Misinformation (AI)
  20. Restricted data
  21. Clean desk policy
  22. Encryption
  23. Policy Violation
  24. VPN (Virtual Private Network)
  25. Business email compromise (BEC)
  26. DDoS attack (Distributed Denial of Service)
  27. Deepfake
  28. confidential data
  29. Data classification
  30. smishing
  31. attack vector
  32. Adware
  33. Digital footprint
  34. Keylogger
  35. Restricted country
  36. Patch update
  37. endpoint security
  38. removable media
  39. penetration testing
  40. Tailgating
  41. Keeper
  42. shadow IT
  43. Cyber hygiene
  44. Role-based access control
  45. Dark web
  46. Credential stuffing
  47. Ransomware
  48. Firewall
  49. Insider threat
  50. Social engineering
  51. Data breach
  52. Phish Alert Button (PAB)
  53. Incident response
  54. Phishing
  55. Free!
  56. Security audit
  57. backdoor
  58. Annual security training
  59. Access control
  60. vishing
  61. sand box
  62. BYOD (Bring Your Own Device)
  63. Blocklisting
  64. Zero-day exploit
  65. Spoofed domain
  66. Spyware