BreachWormDigitalCertificateScarewareSpearphishingHoneypotReusingpasswordsWhalephishingComplianceIntrusionAwarenessZero-dayCyberattackVirusData LossPrevention(DLP)CyberHygieneThreatTrojanPatchSoftwareupdatesSecurityPolicyInsiderThreatAPT(AdvancedPersistentThreat)ScreenlockpolicyBackdoorEncryptionRansomwareEndpointThreatIntelligenceExploitPenetrationTestingPersonallyidentifiableinformation(PII)TrainingSpoofingDarkwebPhishingMalwareVulnerabilityMulti-factorauthentication(MFA)ThreatActorCompromiseBackupsBotnetIncidentResponseSocialEngineeringBreachWormDigitalCertificateScarewareSpearphishingHoneypotReusingpasswordsWhalephishingComplianceIntrusionAwarenessZero-dayCyberattackVirusData LossPrevention(DLP)CyberHygieneThreatTrojanPatchSoftwareupdatesSecurityPolicyInsiderThreatAPT(AdvancedPersistentThreat)ScreenlockpolicyBackdoorEncryptionRansomwareEndpointThreatIntelligenceExploitPenetrationTestingPersonallyidentifiableinformation(PII)TrainingSpoofingDarkwebPhishingMalwareVulnerabilityMulti-factorauthentication(MFA)ThreatActorCompromiseBackupsBotnetIncidentResponseSocialEngineering

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Breach
  2. Worm
  3. Digital Certificate
  4. Scareware
  5. Spear phishing
  6. Honeypot
  7. Reusing passwords
  8. Whale phishing
  9. Compliance
  10. Intrusion
  11. Awareness
  12. Zero-day
  13. Cyberattack
  14. Virus
  15. Data Loss Prevention (DLP)
  16. Cyber Hygiene
  17. Threat
  18. Trojan
  19. Patch
  20. Software updates
  21. Security Policy
  22. Insider Threat
  23. APT (Advanced Persistent Threat)
  24. Screen lock policy
  25. Backdoor
  26. Encryption
  27. Ransomware
  28. Endpoint
  29. Threat Intelligence
  30. Exploit
  31. Penetration Testing
  32. Personally identifiable information (PII)
  33. Training
  34. Spoofing
  35. Dark web
  36. Phishing
  37. Malware
  38. Vulnerability
  39. Multi-factor authentication (MFA)
  40. Threat Actor
  41. Compromise
  42. Backups
  43. Botnet
  44. Incident Response
  45. Social Engineering