DigitalCertificateIntrusionReusingpasswordsSpoofingMulti-factorauthentication(MFA)InsiderThreatBackupsBotnetEndpointWhalephishingEncryptionBreachZero-dayExploitWormPhishingRansomwareThreatActorTrojanSecurityPolicyThreatVirusAwarenessCompromiseData LossPrevention(DLP)IncidentResponseSpearphishingCyberHygieneThreatIntelligenceScreenlockpolicyTrainingHoneypotScarewareSoftwareupdatesVulnerabilitySocialEngineeringPatchCyberattackDarkwebPenetrationTestingComplianceMalwarePersonallyidentifiableinformation(PII)APT(AdvancedPersistentThreat)BackdoorDigitalCertificateIntrusionReusingpasswordsSpoofingMulti-factorauthentication(MFA)InsiderThreatBackupsBotnetEndpointWhalephishingEncryptionBreachZero-dayExploitWormPhishingRansomwareThreatActorTrojanSecurityPolicyThreatVirusAwarenessCompromiseData LossPrevention(DLP)IncidentResponseSpearphishingCyberHygieneThreatIntelligenceScreenlockpolicyTrainingHoneypotScarewareSoftwareupdatesVulnerabilitySocialEngineeringPatchCyberattackDarkwebPenetrationTestingComplianceMalwarePersonallyidentifiableinformation(PII)APT(AdvancedPersistentThreat)Backdoor

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Digital Certificate
  2. Intrusion
  3. Reusing passwords
  4. Spoofing
  5. Multi-factor authentication (MFA)
  6. Insider Threat
  7. Backups
  8. Botnet
  9. Endpoint
  10. Whale phishing
  11. Encryption
  12. Breach
  13. Zero-day
  14. Exploit
  15. Worm
  16. Phishing
  17. Ransomware
  18. Threat Actor
  19. Trojan
  20. Security Policy
  21. Threat
  22. Virus
  23. Awareness
  24. Compromise
  25. Data Loss Prevention (DLP)
  26. Incident Response
  27. Spear phishing
  28. Cyber Hygiene
  29. Threat Intelligence
  30. Screen lock policy
  31. Training
  32. Honeypot
  33. Scareware
  34. Software updates
  35. Vulnerability
  36. Social Engineering
  37. Patch
  38. Cyberattack
  39. Dark web
  40. Penetration Testing
  41. Compliance
  42. Malware
  43. Personally identifiable information (PII)
  44. APT (Advanced Persistent Threat)
  45. Backdoor