ThreatActorThreatIntelligenceSpearphishingSocialEngineeringDDoS(DistributedDenial ofService)SpoofingWormInsiderThreatIPS(IntrusionPreventionSystem)DigitalCertificateAwarenessExploitHoneypotIntrusionPersonallyidentifiableinformation(PII)BackupsVirusScreenlockpolicyData LossPrevention(DLP)ComplianceCompromiseVulnerabilityTrainingSandboxEndpointRansomwareIncidentResponseReusingpasswordsIDS(IntrusionDetectionSystem)CyberattackDarkwebMalwareAPT(AdvancedPersistentThreat)Zero-dayFirewallPenetrationTestingSecurityPolicyThreatWhalephishingPhishingBotnetPatchScarewareTrojanBreachSoftwareupdatesCyberHygieneEncryptionMulti-factorauthentication(MFA)BackdoorThreatActorThreatIntelligenceSpearphishingSocialEngineeringDDoS(DistributedDenial ofService)SpoofingWormInsiderThreatIPS(IntrusionPreventionSystem)DigitalCertificateAwarenessExploitHoneypotIntrusionPersonallyidentifiableinformation(PII)BackupsVirusScreenlockpolicyData LossPrevention(DLP)ComplianceCompromiseVulnerabilityTrainingSandboxEndpointRansomwareIncidentResponseReusingpasswordsIDS(IntrusionDetectionSystem)CyberattackDarkwebMalwareAPT(AdvancedPersistentThreat)Zero-dayFirewallPenetrationTestingSecurityPolicyThreatWhalephishingPhishingBotnetPatchScarewareTrojanBreachSoftwareupdatesCyberHygieneEncryptionMulti-factorauthentication(MFA)Backdoor

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Threat Actor
  2. Threat Intelligence
  3. Spear phishing
  4. Social Engineering
  5. DDoS (Distributed Denial of Service)
  6. Spoofing
  7. Worm
  8. Insider Threat
  9. IPS (Intrusion Prevention System)
  10. Digital Certificate
  11. Awareness
  12. Exploit
  13. Honeypot
  14. Intrusion
  15. Personally identifiable information (PII)
  16. Backups
  17. Virus
  18. Screen lock policy
  19. Data Loss Prevention (DLP)
  20. Compliance
  21. Compromise
  22. Vulnerability
  23. Training
  24. Sandbox
  25. Endpoint
  26. Ransomware
  27. Incident Response
  28. Reusing passwords
  29. IDS (Intrusion Detection System)
  30. Cyberattack
  31. Dark web
  32. Malware
  33. APT (Advanced Persistent Threat)
  34. Zero-day
  35. Firewall
  36. Penetration Testing
  37. Security Policy
  38. Threat
  39. Whale phishing
  40. Phishing
  41. Botnet
  42. Patch
  43. Scareware
  44. Trojan
  45. Breach
  46. Software updates
  47. Cyber Hygiene
  48. Encryption
  49. Multi-factor authentication (MFA)
  50. Backdoor