ScreenlockpolicyEncryptionBackdoorSoftwareupdatesSpearphishingVirusHoneypotPenetrationTestingDigitalCertificateAPT(AdvancedPersistentThreat)VulnerabilityReusingpasswordsScarewareSocialEngineeringPhishingWhalephishingCyberHygieneRansomwarePersonallyidentifiableinformation(PII)DarkwebThreatIntelligenceEndpointSpoofingBackupsAwarenessSecurityPolicyInsiderThreatBreachTrainingIncidentResponseThreatComplianceThreatActorCompromiseZero-dayMulti-factorauthentication(MFA)WormIntrusionBotnetPatchTrojanData LossPrevention(DLP)MalwareExploitCyberattackScreenlockpolicyEncryptionBackdoorSoftwareupdatesSpearphishingVirusHoneypotPenetrationTestingDigitalCertificateAPT(AdvancedPersistentThreat)VulnerabilityReusingpasswordsScarewareSocialEngineeringPhishingWhalephishingCyberHygieneRansomwarePersonallyidentifiableinformation(PII)DarkwebThreatIntelligenceEndpointSpoofingBackupsAwarenessSecurityPolicyInsiderThreatBreachTrainingIncidentResponseThreatComplianceThreatActorCompromiseZero-dayMulti-factorauthentication(MFA)WormIntrusionBotnetPatchTrojanData LossPrevention(DLP)MalwareExploitCyberattack

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Screen lock policy
  2. Encryption
  3. Backdoor
  4. Software updates
  5. Spear phishing
  6. Virus
  7. Honeypot
  8. Penetration Testing
  9. Digital Certificate
  10. APT (Advanced Persistent Threat)
  11. Vulnerability
  12. Reusing passwords
  13. Scareware
  14. Social Engineering
  15. Phishing
  16. Whale phishing
  17. Cyber Hygiene
  18. Ransomware
  19. Personally identifiable information (PII)
  20. Dark web
  21. Threat Intelligence
  22. Endpoint
  23. Spoofing
  24. Backups
  25. Awareness
  26. Security Policy
  27. Insider Threat
  28. Breach
  29. Training
  30. Incident Response
  31. Threat
  32. Compliance
  33. Threat Actor
  34. Compromise
  35. Zero-day
  36. Multi-factor authentication (MFA)
  37. Worm
  38. Intrusion
  39. Botnet
  40. Patch
  41. Trojan
  42. Data Loss Prevention (DLP)
  43. Malware
  44. Exploit
  45. Cyberattack