PenetrationTestingThreatIntelligenceCyberattackWormHoneypotTrainingDigitalCertificateBackupsCyberHygieneEncryptionPhishingPatchDarkwebIncidentResponseRansomwareZero-dayVirusMulti-factorauthentication(MFA)SpearphishingMalwareVulnerabilityInsiderThreatPersonallyidentifiableinformation(PII)EndpointWhalephishingExploitThreatActorAwarenessSocialEngineeringAPT(AdvancedPersistentThreat)ReusingpasswordsBackdoorThreatTrojanScreenlockpolicySecurityPolicyScarewareData LossPrevention(DLP)BotnetIntrusionCompromiseBreachSpoofingSoftwareupdatesCompliancePenetrationTestingThreatIntelligenceCyberattackWormHoneypotTrainingDigitalCertificateBackupsCyberHygieneEncryptionPhishingPatchDarkwebIncidentResponseRansomwareZero-dayVirusMulti-factorauthentication(MFA)SpearphishingMalwareVulnerabilityInsiderThreatPersonallyidentifiableinformation(PII)EndpointWhalephishingExploitThreatActorAwarenessSocialEngineeringAPT(AdvancedPersistentThreat)ReusingpasswordsBackdoorThreatTrojanScreenlockpolicySecurityPolicyScarewareData LossPrevention(DLP)BotnetIntrusionCompromiseBreachSpoofingSoftwareupdatesCompliance

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Penetration Testing
  2. Threat Intelligence
  3. Cyberattack
  4. Worm
  5. Honeypot
  6. Training
  7. Digital Certificate
  8. Backups
  9. Cyber Hygiene
  10. Encryption
  11. Phishing
  12. Patch
  13. Dark web
  14. Incident Response
  15. Ransomware
  16. Zero-day
  17. Virus
  18. Multi-factor authentication (MFA)
  19. Spear phishing
  20. Malware
  21. Vulnerability
  22. Insider Threat
  23. Personally identifiable information (PII)
  24. Endpoint
  25. Whale phishing
  26. Exploit
  27. Threat Actor
  28. Awareness
  29. Social Engineering
  30. APT (Advanced Persistent Threat)
  31. Reusing passwords
  32. Backdoor
  33. Threat
  34. Trojan
  35. Screen lock policy
  36. Security Policy
  37. Scareware
  38. Data Loss Prevention (DLP)
  39. Botnet
  40. Intrusion
  41. Compromise
  42. Breach
  43. Spoofing
  44. Software updates
  45. Compliance