SocialEngineeringSandboxEncryptionFirewallBackupsDarkwebData LossPrevention(DLP)IncidentResponseVirusCyberHygieneWormExploitBotnetSoftwareupdatesIntrusionWhalephishingIPS(IntrusionPreventionSystem)ReusingpasswordsScreenlockpolicyDDoS(DistributedDenial ofService)PenetrationTestingCyberattackTrojanPhishingZero-dayPersonallyidentifiableinformation(PII)PatchComplianceMalwareInsiderThreatEndpointAwarenessHoneypotCompromiseThreatActorThreatIntelligenceBreachScarewareIDS(IntrusionDetectionSystem)DigitalCertificateMulti-factorauthentication(MFA)SpearphishingVulnerabilitySecurityPolicyRansomwareAPT(AdvancedPersistentThreat)SpoofingBackdoorTrainingThreatSocialEngineeringSandboxEncryptionFirewallBackupsDarkwebData LossPrevention(DLP)IncidentResponseVirusCyberHygieneWormExploitBotnetSoftwareupdatesIntrusionWhalephishingIPS(IntrusionPreventionSystem)ReusingpasswordsScreenlockpolicyDDoS(DistributedDenial ofService)PenetrationTestingCyberattackTrojanPhishingZero-dayPersonallyidentifiableinformation(PII)PatchComplianceMalwareInsiderThreatEndpointAwarenessHoneypotCompromiseThreatActorThreatIntelligenceBreachScarewareIDS(IntrusionDetectionSystem)DigitalCertificateMulti-factorauthentication(MFA)SpearphishingVulnerabilitySecurityPolicyRansomwareAPT(AdvancedPersistentThreat)SpoofingBackdoorTrainingThreat

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Social Engineering
  2. Sandbox
  3. Encryption
  4. Firewall
  5. Backups
  6. Dark web
  7. Data Loss Prevention (DLP)
  8. Incident Response
  9. Virus
  10. Cyber Hygiene
  11. Worm
  12. Exploit
  13. Botnet
  14. Software updates
  15. Intrusion
  16. Whale phishing
  17. IPS (Intrusion Prevention System)
  18. Reusing passwords
  19. Screen lock policy
  20. DDoS (Distributed Denial of Service)
  21. Penetration Testing
  22. Cyberattack
  23. Trojan
  24. Phishing
  25. Zero-day
  26. Personally identifiable information (PII)
  27. Patch
  28. Compliance
  29. Malware
  30. Insider Threat
  31. Endpoint
  32. Awareness
  33. Honeypot
  34. Compromise
  35. Threat Actor
  36. Threat Intelligence
  37. Breach
  38. Scareware
  39. IDS (Intrusion Detection System)
  40. Digital Certificate
  41. Multi-factor authentication (MFA)
  42. Spear phishing
  43. Vulnerability
  44. Security Policy
  45. Ransomware
  46. APT (Advanced Persistent Threat)
  47. Spoofing
  48. Backdoor
  49. Training
  50. Threat