BotnetEncryptionTrojanEndpointCyberHygieneZero-dayMulti-factorauthentication(MFA)ComplianceSecurityPolicySpoofingData LossPrevention(DLP)PhishingDigitalCertificateSpearphishingScreenlockpolicyPersonallyidentifiableinformation(PII)DarkwebHoneypotBreachThreatRansomwareVirusInsiderThreatScarewareExploitPatchIncidentResponseSoftwareupdatesTrainingWormWhalephishingAwarenessMalwareBackupsThreatActorThreatIntelligenceVulnerabilityReusingpasswordsBackdoorAPT(AdvancedPersistentThreat)SocialEngineeringPenetrationTestingIntrusionCompromiseCyberattackBotnetEncryptionTrojanEndpointCyberHygieneZero-dayMulti-factorauthentication(MFA)ComplianceSecurityPolicySpoofingData LossPrevention(DLP)PhishingDigitalCertificateSpearphishingScreenlockpolicyPersonallyidentifiableinformation(PII)DarkwebHoneypotBreachThreatRansomwareVirusInsiderThreatScarewareExploitPatchIncidentResponseSoftwareupdatesTrainingWormWhalephishingAwarenessMalwareBackupsThreatActorThreatIntelligenceVulnerabilityReusingpasswordsBackdoorAPT(AdvancedPersistentThreat)SocialEngineeringPenetrationTestingIntrusionCompromiseCyberattack

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Botnet
  2. Encryption
  3. Trojan
  4. Endpoint
  5. Cyber Hygiene
  6. Zero-day
  7. Multi-factor authentication (MFA)
  8. Compliance
  9. Security Policy
  10. Spoofing
  11. Data Loss Prevention (DLP)
  12. Phishing
  13. Digital Certificate
  14. Spear phishing
  15. Screen lock policy
  16. Personally identifiable information (PII)
  17. Dark web
  18. Honeypot
  19. Breach
  20. Threat
  21. Ransomware
  22. Virus
  23. Insider Threat
  24. Scareware
  25. Exploit
  26. Patch
  27. Incident Response
  28. Software updates
  29. Training
  30. Worm
  31. Whale phishing
  32. Awareness
  33. Malware
  34. Backups
  35. Threat Actor
  36. Threat Intelligence
  37. Vulnerability
  38. Reusing passwords
  39. Backdoor
  40. APT (Advanced Persistent Threat)
  41. Social Engineering
  42. Penetration Testing
  43. Intrusion
  44. Compromise
  45. Cyberattack