IncidentResponseScreenlockpolicyPersonallyidentifiableinformation(PII)Zero-daySecurityPolicySoftwareupdatesDarkwebHoneypotMalwareCyberHygieneThreatMulti-factorauthentication(MFA)PhishingBackdoorComplianceTrainingPenetrationTestingWormBackupsAPT(AdvancedPersistentThreat)ScarewareSpoofingVirusCompromiseWhalephishingIntrusionThreatActorData LossPrevention(DLP)EncryptionPatchBreachCyberattackReusingpasswordsExploitEndpointVulnerabilitySocialEngineeringAwarenessBotnetDigitalCertificateRansomwareThreatIntelligenceInsiderThreatSpearphishingTrojanIncidentResponseScreenlockpolicyPersonallyidentifiableinformation(PII)Zero-daySecurityPolicySoftwareupdatesDarkwebHoneypotMalwareCyberHygieneThreatMulti-factorauthentication(MFA)PhishingBackdoorComplianceTrainingPenetrationTestingWormBackupsAPT(AdvancedPersistentThreat)ScarewareSpoofingVirusCompromiseWhalephishingIntrusionThreatActorData LossPrevention(DLP)EncryptionPatchBreachCyberattackReusingpasswordsExploitEndpointVulnerabilitySocialEngineeringAwarenessBotnetDigitalCertificateRansomwareThreatIntelligenceInsiderThreatSpearphishingTrojan

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Incident Response
  2. Screen lock policy
  3. Personally identifiable information (PII)
  4. Zero-day
  5. Security Policy
  6. Software updates
  7. Dark web
  8. Honeypot
  9. Malware
  10. Cyber Hygiene
  11. Threat
  12. Multi-factor authentication (MFA)
  13. Phishing
  14. Backdoor
  15. Compliance
  16. Training
  17. Penetration Testing
  18. Worm
  19. Backups
  20. APT (Advanced Persistent Threat)
  21. Scareware
  22. Spoofing
  23. Virus
  24. Compromise
  25. Whale phishing
  26. Intrusion
  27. Threat Actor
  28. Data Loss Prevention (DLP)
  29. Encryption
  30. Patch
  31. Breach
  32. Cyberattack
  33. Reusing passwords
  34. Exploit
  35. Endpoint
  36. Vulnerability
  37. Social Engineering
  38. Awareness
  39. Botnet
  40. Digital Certificate
  41. Ransomware
  42. Threat Intelligence
  43. Insider Threat
  44. Spear phishing
  45. Trojan