BreachThreatBackdoorAwarenessMulti-factorauthentication(MFA)PatchTrainingSecurityPolicyIncidentResponseScreenlockpolicyExploitSoftwareupdatesPersonallyidentifiableinformation(PII)BotnetReusingpasswordsCompromiseDigitalCertificateThreatActorDarkwebWhalephishingSpearphishingAPT(AdvancedPersistentThreat)IntrusionData LossPrevention(DLP)CyberattackBackupsPhishingCyberHygieneThreatIntelligenceEncryptionSpoofingPenetrationTestingMalwareInsiderThreatSocialEngineeringVirusScarewareRansomwareZero-dayEndpointTrojanHoneypotComplianceVulnerabilityWormBreachThreatBackdoorAwarenessMulti-factorauthentication(MFA)PatchTrainingSecurityPolicyIncidentResponseScreenlockpolicyExploitSoftwareupdatesPersonallyidentifiableinformation(PII)BotnetReusingpasswordsCompromiseDigitalCertificateThreatActorDarkwebWhalephishingSpearphishingAPT(AdvancedPersistentThreat)IntrusionData LossPrevention(DLP)CyberattackBackupsPhishingCyberHygieneThreatIntelligenceEncryptionSpoofingPenetrationTestingMalwareInsiderThreatSocialEngineeringVirusScarewareRansomwareZero-dayEndpointTrojanHoneypotComplianceVulnerabilityWorm

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Breach
  2. Threat
  3. Backdoor
  4. Awareness
  5. Multi-factor authentication (MFA)
  6. Patch
  7. Training
  8. Security Policy
  9. Incident Response
  10. Screen lock policy
  11. Exploit
  12. Software updates
  13. Personally identifiable information (PII)
  14. Botnet
  15. Reusing passwords
  16. Compromise
  17. Digital Certificate
  18. Threat Actor
  19. Dark web
  20. Whale phishing
  21. Spear phishing
  22. APT (Advanced Persistent Threat)
  23. Intrusion
  24. Data Loss Prevention (DLP)
  25. Cyberattack
  26. Backups
  27. Phishing
  28. Cyber Hygiene
  29. Threat Intelligence
  30. Encryption
  31. Spoofing
  32. Penetration Testing
  33. Malware
  34. Insider Threat
  35. Social Engineering
  36. Virus
  37. Scareware
  38. Ransomware
  39. Zero-day
  40. Endpoint
  41. Trojan
  42. Honeypot
  43. Compliance
  44. Vulnerability
  45. Worm