WhalephishingBackdoorInsiderThreatMulti-factorauthentication(MFA)CyberHygieneEndpointIPS(IntrusionPreventionSystem)MalwareThreatIntelligenceSoftwareupdatesExploitCyberattackIncidentResponseSpoofingSandboxTrainingData LossPrevention(DLP)RansomwareZero-dayIntrusionDigitalCertificateDarkwebPenetrationTestingThreatActorPatchFirewallHoneypotBotnetTrojanEncryptionIDS(IntrusionDetectionSystem)SocialEngineeringScarewareComplianceDDoS(DistributedDenial ofService)BackupsSpearphishingReusingpasswordsVulnerabilityVirusCompromiseWormBreachPhishingPersonallyidentifiableinformation(PII)SecurityPolicyThreatAwarenessAPT(AdvancedPersistentThreat)ScreenlockpolicyWhalephishingBackdoorInsiderThreatMulti-factorauthentication(MFA)CyberHygieneEndpointIPS(IntrusionPreventionSystem)MalwareThreatIntelligenceSoftwareupdatesExploitCyberattackIncidentResponseSpoofingSandboxTrainingData LossPrevention(DLP)RansomwareZero-dayIntrusionDigitalCertificateDarkwebPenetrationTestingThreatActorPatchFirewallHoneypotBotnetTrojanEncryptionIDS(IntrusionDetectionSystem)SocialEngineeringScarewareComplianceDDoS(DistributedDenial ofService)BackupsSpearphishingReusingpasswordsVulnerabilityVirusCompromiseWormBreachPhishingPersonallyidentifiableinformation(PII)SecurityPolicyThreatAwarenessAPT(AdvancedPersistentThreat)Screenlockpolicy

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Whale phishing
  2. Backdoor
  3. Insider Threat
  4. Multi-factor authentication (MFA)
  5. Cyber Hygiene
  6. Endpoint
  7. IPS (Intrusion Prevention System)
  8. Malware
  9. Threat Intelligence
  10. Software updates
  11. Exploit
  12. Cyberattack
  13. Incident Response
  14. Spoofing
  15. Sandbox
  16. Training
  17. Data Loss Prevention (DLP)
  18. Ransomware
  19. Zero-day
  20. Intrusion
  21. Digital Certificate
  22. Dark web
  23. Penetration Testing
  24. Threat Actor
  25. Patch
  26. Firewall
  27. Honeypot
  28. Botnet
  29. Trojan
  30. Encryption
  31. IDS (Intrusion Detection System)
  32. Social Engineering
  33. Scareware
  34. Compliance
  35. DDoS (Distributed Denial of Service)
  36. Backups
  37. Spear phishing
  38. Reusing passwords
  39. Vulnerability
  40. Virus
  41. Compromise
  42. Worm
  43. Breach
  44. Phishing
  45. Personally identifiable information (PII)
  46. Security Policy
  47. Threat
  48. Awareness
  49. APT (Advanced Persistent Threat)
  50. Screen lock policy