SoftwareupdatesMalwareCyberattackPhishingData LossPrevention(DLP)Zero-dayBotnetWormScreenlockpolicyWhalephishingPatchPenetrationTestingBreachAwarenessComplianceBackdoorPersonallyidentifiableinformation(PII)ThreatIntelligenceBackupsScarewareVirusSpearphishingHoneypotIntrusionCompromiseMulti-factorauthentication(MFA)InsiderThreatIncidentResponseEncryptionAPT(AdvancedPersistentThreat)ReusingpasswordsThreatActorDigitalCertificateSocialEngineeringVulnerabilityTrojanThreatSpoofingDarkwebCyberHygieneRansomwareEndpointTrainingExploitSecurityPolicySoftwareupdatesMalwareCyberattackPhishingData LossPrevention(DLP)Zero-dayBotnetWormScreenlockpolicyWhalephishingPatchPenetrationTestingBreachAwarenessComplianceBackdoorPersonallyidentifiableinformation(PII)ThreatIntelligenceBackupsScarewareVirusSpearphishingHoneypotIntrusionCompromiseMulti-factorauthentication(MFA)InsiderThreatIncidentResponseEncryptionAPT(AdvancedPersistentThreat)ReusingpasswordsThreatActorDigitalCertificateSocialEngineeringVulnerabilityTrojanThreatSpoofingDarkwebCyberHygieneRansomwareEndpointTrainingExploitSecurityPolicy

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Software updates
  2. Malware
  3. Cyberattack
  4. Phishing
  5. Data Loss Prevention (DLP)
  6. Zero-day
  7. Botnet
  8. Worm
  9. Screen lock policy
  10. Whale phishing
  11. Patch
  12. Penetration Testing
  13. Breach
  14. Awareness
  15. Compliance
  16. Backdoor
  17. Personally identifiable information (PII)
  18. Threat Intelligence
  19. Backups
  20. Scareware
  21. Virus
  22. Spear phishing
  23. Honeypot
  24. Intrusion
  25. Compromise
  26. Multi-factor authentication (MFA)
  27. Insider Threat
  28. Incident Response
  29. Encryption
  30. APT (Advanced Persistent Threat)
  31. Reusing passwords
  32. Threat Actor
  33. Digital Certificate
  34. Social Engineering
  35. Vulnerability
  36. Trojan
  37. Threat
  38. Spoofing
  39. Dark web
  40. Cyber Hygiene
  41. Ransomware
  42. Endpoint
  43. Training
  44. Exploit
  45. Security Policy