CyberattackScreenlockpolicyCyberHygieneTrojanAwarenessEndpointRansomwareInsiderThreatPersonallyidentifiableinformation(PII)SpoofingPenetrationTestingZero-dayWormWhalephishingPatchExploitMulti-factorauthentication(MFA)DarkwebPhishingAPT(AdvancedPersistentThreat)TrainingMalwareCompromiseVirusVulnerabilityEncryptionBackdoorBreachBotnetComplianceIntrusionSecurityPolicyData LossPrevention(DLP)SoftwareupdatesBackupsSpearphishingThreatHoneypotDigitalCertificateSocialEngineeringIncidentResponseScarewareReusingpasswordsThreatActorThreatIntelligenceCyberattackScreenlockpolicyCyberHygieneTrojanAwarenessEndpointRansomwareInsiderThreatPersonallyidentifiableinformation(PII)SpoofingPenetrationTestingZero-dayWormWhalephishingPatchExploitMulti-factorauthentication(MFA)DarkwebPhishingAPT(AdvancedPersistentThreat)TrainingMalwareCompromiseVirusVulnerabilityEncryptionBackdoorBreachBotnetComplianceIntrusionSecurityPolicyData LossPrevention(DLP)SoftwareupdatesBackupsSpearphishingThreatHoneypotDigitalCertificateSocialEngineeringIncidentResponseScarewareReusingpasswordsThreatActorThreatIntelligence

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Cyberattack
  2. Screen lock policy
  3. Cyber Hygiene
  4. Trojan
  5. Awareness
  6. Endpoint
  7. Ransomware
  8. Insider Threat
  9. Personally identifiable information (PII)
  10. Spoofing
  11. Penetration Testing
  12. Zero-day
  13. Worm
  14. Whale phishing
  15. Patch
  16. Exploit
  17. Multi-factor authentication (MFA)
  18. Dark web
  19. Phishing
  20. APT (Advanced Persistent Threat)
  21. Training
  22. Malware
  23. Compromise
  24. Virus
  25. Vulnerability
  26. Encryption
  27. Backdoor
  28. Breach
  29. Botnet
  30. Compliance
  31. Intrusion
  32. Security Policy
  33. Data Loss Prevention (DLP)
  34. Software updates
  35. Backups
  36. Spear phishing
  37. Threat
  38. Honeypot
  39. Digital Certificate
  40. Social Engineering
  41. Incident Response
  42. Scareware
  43. Reusing passwords
  44. Threat Actor
  45. Threat Intelligence