ExploitMalwareThreatActorBreachInsiderThreatComplianceDarkwebSoftwareupdatesEndpointSpearphishingWhalephishingAwarenessRansomwareThreatIntelligenceCompromiseCyberattackBotnetData LossPrevention(DLP)SocialEngineeringBackupsPenetrationTestingSecurityPolicyTrainingHoneypotThreatTrojanBackdoorAPT(AdvancedPersistentThreat)CyberHygienePersonallyidentifiableinformation(PII)VulnerabilityMulti-factorauthentication(MFA)ReusingpasswordsIncidentResponseScreenlockpolicyIntrusionDigitalCertificateEncryptionZero-dayPatchWormVirusPhishingSpoofingScarewareExploitMalwareThreatActorBreachInsiderThreatComplianceDarkwebSoftwareupdatesEndpointSpearphishingWhalephishingAwarenessRansomwareThreatIntelligenceCompromiseCyberattackBotnetData LossPrevention(DLP)SocialEngineeringBackupsPenetrationTestingSecurityPolicyTrainingHoneypotThreatTrojanBackdoorAPT(AdvancedPersistentThreat)CyberHygienePersonallyidentifiableinformation(PII)VulnerabilityMulti-factorauthentication(MFA)ReusingpasswordsIncidentResponseScreenlockpolicyIntrusionDigitalCertificateEncryptionZero-dayPatchWormVirusPhishingSpoofingScareware

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Exploit
  2. Malware
  3. Threat Actor
  4. Breach
  5. Insider Threat
  6. Compliance
  7. Dark web
  8. Software updates
  9. Endpoint
  10. Spear phishing
  11. Whale phishing
  12. Awareness
  13. Ransomware
  14. Threat Intelligence
  15. Compromise
  16. Cyberattack
  17. Botnet
  18. Data Loss Prevention (DLP)
  19. Social Engineering
  20. Backups
  21. Penetration Testing
  22. Security Policy
  23. Training
  24. Honeypot
  25. Threat
  26. Trojan
  27. Backdoor
  28. APT (Advanced Persistent Threat)
  29. Cyber Hygiene
  30. Personally identifiable information (PII)
  31. Vulnerability
  32. Multi-factor authentication (MFA)
  33. Reusing passwords
  34. Incident Response
  35. Screen lock policy
  36. Intrusion
  37. Digital Certificate
  38. Encryption
  39. Zero-day
  40. Patch
  41. Worm
  42. Virus
  43. Phishing
  44. Spoofing
  45. Scareware