DarkwebCompromiseBotnetPatchWhalephishingBackdoorThreatActorVirusPhishingBreachIncidentResponseRansomwareAPT(AdvancedPersistentThreat)Personallyidentifiableinformation(PII)ScarewareThreatIntelligenceAwarenessPenetrationTestingDigitalCertificateSocialEngineeringWormIntrusionZero-daySoftwareupdatesExploitScreenlockpolicyHoneypotBackupsMalwareEncryptionVulnerabilityMulti-factorauthentication(MFA)TrainingThreatCyberHygieneData LossPrevention(DLP)SpearphishingInsiderThreatComplianceSpoofingEndpointReusingpasswordsTrojanSecurityPolicyCyberattackDarkwebCompromiseBotnetPatchWhalephishingBackdoorThreatActorVirusPhishingBreachIncidentResponseRansomwareAPT(AdvancedPersistentThreat)Personallyidentifiableinformation(PII)ScarewareThreatIntelligenceAwarenessPenetrationTestingDigitalCertificateSocialEngineeringWormIntrusionZero-daySoftwareupdatesExploitScreenlockpolicyHoneypotBackupsMalwareEncryptionVulnerabilityMulti-factorauthentication(MFA)TrainingThreatCyberHygieneData LossPrevention(DLP)SpearphishingInsiderThreatComplianceSpoofingEndpointReusingpasswordsTrojanSecurityPolicyCyberattack

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Dark web
  2. Compromise
  3. Botnet
  4. Patch
  5. Whale phishing
  6. Backdoor
  7. Threat Actor
  8. Virus
  9. Phishing
  10. Breach
  11. Incident Response
  12. Ransomware
  13. APT (Advanced Persistent Threat)
  14. Personally identifiable information (PII)
  15. Scareware
  16. Threat Intelligence
  17. Awareness
  18. Penetration Testing
  19. Digital Certificate
  20. Social Engineering
  21. Worm
  22. Intrusion
  23. Zero-day
  24. Software updates
  25. Exploit
  26. Screen lock policy
  27. Honeypot
  28. Backups
  29. Malware
  30. Encryption
  31. Vulnerability
  32. Multi-factor authentication (MFA)
  33. Training
  34. Threat
  35. Cyber Hygiene
  36. Data Loss Prevention (DLP)
  37. Spear phishing
  38. Insider Threat
  39. Compliance
  40. Spoofing
  41. Endpoint
  42. Reusing passwords
  43. Trojan
  44. Security Policy
  45. Cyberattack