BackupsCyberHygieneIDS(IntrusionDetectionSystem)Data LossPrevention(DLP)PenetrationTestingCompromisePersonallyidentifiableinformation(PII)WormIntrusionMalwareReusingpasswordsCyberattackZero-dayEndpointPhishingMulti-factorauthentication(MFA)VirusTrojanHoneypotFirewallSandboxSoftwareupdatesScarewareSecurityPolicyAwarenessDarkwebRansomwareWhalephishingBotnetAPT(AdvancedPersistentThreat)SpearphishingInsiderThreatIncidentResponseDigitalCertificateBreachSocialEngineeringThreatActorScreenlockpolicyDDoS(DistributedDenial ofService)IPS(IntrusionPreventionSystem)PatchVulnerabilitySpoofingThreatIntelligenceEncryptionThreatComplianceBackdoorExploitTrainingBackupsCyberHygieneIDS(IntrusionDetectionSystem)Data LossPrevention(DLP)PenetrationTestingCompromisePersonallyidentifiableinformation(PII)WormIntrusionMalwareReusingpasswordsCyberattackZero-dayEndpointPhishingMulti-factorauthentication(MFA)VirusTrojanHoneypotFirewallSandboxSoftwareupdatesScarewareSecurityPolicyAwarenessDarkwebRansomwareWhalephishingBotnetAPT(AdvancedPersistentThreat)SpearphishingInsiderThreatIncidentResponseDigitalCertificateBreachSocialEngineeringThreatActorScreenlockpolicyDDoS(DistributedDenial ofService)IPS(IntrusionPreventionSystem)PatchVulnerabilitySpoofingThreatIntelligenceEncryptionThreatComplianceBackdoorExploitTraining

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Backups
  2. Cyber Hygiene
  3. IDS (Intrusion Detection System)
  4. Data Loss Prevention (DLP)
  5. Penetration Testing
  6. Compromise
  7. Personally identifiable information (PII)
  8. Worm
  9. Intrusion
  10. Malware
  11. Reusing passwords
  12. Cyberattack
  13. Zero-day
  14. Endpoint
  15. Phishing
  16. Multi-factor authentication (MFA)
  17. Virus
  18. Trojan
  19. Honeypot
  20. Firewall
  21. Sandbox
  22. Software updates
  23. Scareware
  24. Security Policy
  25. Awareness
  26. Dark web
  27. Ransomware
  28. Whale phishing
  29. Botnet
  30. APT (Advanced Persistent Threat)
  31. Spear phishing
  32. Insider Threat
  33. Incident Response
  34. Digital Certificate
  35. Breach
  36. Social Engineering
  37. Threat Actor
  38. Screen lock policy
  39. DDoS (Distributed Denial of Service)
  40. IPS (Intrusion Prevention System)
  41. Patch
  42. Vulnerability
  43. Spoofing
  44. Threat Intelligence
  45. Encryption
  46. Threat
  47. Compliance
  48. Backdoor
  49. Exploit
  50. Training