ThreatBackdoorCompromiseVirusWhalephishingEndpointReusingpasswordsVulnerabilityWormTrojanAPT(AdvancedPersistentThreat)ThreatActorIntrusionZero-dayBotnetSoftwareupdatesCyberHygienePhishingRansomwareSecurityPolicySpoofingThreatIntelligenceBackupsPenetrationTestingEncryptionExploitCyberattackComplianceScreenlockpolicySpearphishingDigitalCertificateData LossPrevention(DLP)HoneypotMulti-factorauthentication(MFA)ScarewareSocialEngineeringMalwareIncidentResponseDarkwebPersonallyidentifiableinformation(PII)BreachTrainingPatchInsiderThreatAwarenessThreatBackdoorCompromiseVirusWhalephishingEndpointReusingpasswordsVulnerabilityWormTrojanAPT(AdvancedPersistentThreat)ThreatActorIntrusionZero-dayBotnetSoftwareupdatesCyberHygienePhishingRansomwareSecurityPolicySpoofingThreatIntelligenceBackupsPenetrationTestingEncryptionExploitCyberattackComplianceScreenlockpolicySpearphishingDigitalCertificateData LossPrevention(DLP)HoneypotMulti-factorauthentication(MFA)ScarewareSocialEngineeringMalwareIncidentResponseDarkwebPersonallyidentifiableinformation(PII)BreachTrainingPatchInsiderThreatAwareness

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Threat
  2. Backdoor
  3. Compromise
  4. Virus
  5. Whale phishing
  6. Endpoint
  7. Reusing passwords
  8. Vulnerability
  9. Worm
  10. Trojan
  11. APT (Advanced Persistent Threat)
  12. Threat Actor
  13. Intrusion
  14. Zero-day
  15. Botnet
  16. Software updates
  17. Cyber Hygiene
  18. Phishing
  19. Ransomware
  20. Security Policy
  21. Spoofing
  22. Threat Intelligence
  23. Backups
  24. Penetration Testing
  25. Encryption
  26. Exploit
  27. Cyberattack
  28. Compliance
  29. Screen lock policy
  30. Spear phishing
  31. Digital Certificate
  32. Data Loss Prevention (DLP)
  33. Honeypot
  34. Multi-factor authentication (MFA)
  35. Scareware
  36. Social Engineering
  37. Malware
  38. Incident Response
  39. Dark web
  40. Personally identifiable information (PII)
  41. Breach
  42. Training
  43. Patch
  44. Insider Threat
  45. Awareness