SpoofingReusingpasswordsCyberattackTrainingSecurityPolicyExploitAwarenessRansomwarePersonallyidentifiableinformation(PII)WhalephishingCompromiseBotnetPenetrationTestingHoneypotSoftwareupdatesVulnerabilityAPT(AdvancedPersistentThreat)ComplianceThreatDDoS(DistributedDenial ofService)Zero-daySpearphishingBackupsEncryptionSandboxDarkwebScarewareBackdoorIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)EndpointMalwarePhishingIDS(IntrusionDetectionSystem)CyberHygieneIncidentResponseIntrusionInsiderThreatThreatActorSocialEngineeringFirewallData LossPrevention(DLP)PatchTrojanWormThreatIntelligenceBreachDigitalCertificateScreenlockpolicyVirusSpoofingReusingpasswordsCyberattackTrainingSecurityPolicyExploitAwarenessRansomwarePersonallyidentifiableinformation(PII)WhalephishingCompromiseBotnetPenetrationTestingHoneypotSoftwareupdatesVulnerabilityAPT(AdvancedPersistentThreat)ComplianceThreatDDoS(DistributedDenial ofService)Zero-daySpearphishingBackupsEncryptionSandboxDarkwebScarewareBackdoorIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)EndpointMalwarePhishingIDS(IntrusionDetectionSystem)CyberHygieneIncidentResponseIntrusionInsiderThreatThreatActorSocialEngineeringFirewallData LossPrevention(DLP)PatchTrojanWormThreatIntelligenceBreachDigitalCertificateScreenlockpolicyVirus

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Spoofing
  2. Reusing passwords
  3. Cyberattack
  4. Training
  5. Security Policy
  6. Exploit
  7. Awareness
  8. Ransomware
  9. Personally identifiable information (PII)
  10. Whale phishing
  11. Compromise
  12. Botnet
  13. Penetration Testing
  14. Honeypot
  15. Software updates
  16. Vulnerability
  17. APT (Advanced Persistent Threat)
  18. Compliance
  19. Threat
  20. DDoS (Distributed Denial of Service)
  21. Zero-day
  22. Spear phishing
  23. Backups
  24. Encryption
  25. Sandbox
  26. Dark web
  27. Scareware
  28. Backdoor
  29. IPS (Intrusion Prevention System)
  30. Multi-factor authentication (MFA)
  31. Endpoint
  32. Malware
  33. Phishing
  34. IDS (Intrusion Detection System)
  35. Cyber Hygiene
  36. Incident Response
  37. Intrusion
  38. Insider Threat
  39. Threat Actor
  40. Social Engineering
  41. Firewall
  42. Data Loss Prevention (DLP)
  43. Patch
  44. Trojan
  45. Worm
  46. Threat Intelligence
  47. Breach
  48. Digital Certificate
  49. Screen lock policy
  50. Virus