WormWhalephishingReusingpasswordsThreatSandboxCompromiseSoftwareupdatesScarewareSocialEngineeringBackupsVirusExploitSpearphishingMulti-factorauthentication(MFA)APT(AdvancedPersistentThreat)RansomwareTrainingCyberHygieneIntrusionIPS(IntrusionPreventionSystem)PhishingZero-dayPersonallyidentifiableinformation(PII)PatchScreenlockpolicyBreachThreatActorSecurityPolicyDarkwebBotnetHashingCyberattackIncidentResponsePenetrationTestingData LossPrevention(DLP)HoneypotMalwareThreatIntelligenceComplianceInsiderThreatEncryptionRiskAssessmentSpoofingTrojanDigitalCertificateIDS(IntrusionDetectionSystem)BackdoorVulnerabilityEndpointAwarenessWormWhalephishingReusingpasswordsThreatSandboxCompromiseSoftwareupdatesScarewareSocialEngineeringBackupsVirusExploitSpearphishingMulti-factorauthentication(MFA)APT(AdvancedPersistentThreat)RansomwareTrainingCyberHygieneIntrusionIPS(IntrusionPreventionSystem)PhishingZero-dayPersonallyidentifiableinformation(PII)PatchScreenlockpolicyBreachThreatActorSecurityPolicyDarkwebBotnetHashingCyberattackIncidentResponsePenetrationTestingData LossPrevention(DLP)HoneypotMalwareThreatIntelligenceComplianceInsiderThreatEncryptionRiskAssessmentSpoofingTrojanDigitalCertificateIDS(IntrusionDetectionSystem)BackdoorVulnerabilityEndpointAwareness

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Worm
  2. Whale phishing
  3. Reusing passwords
  4. Threat
  5. Sandbox
  6. Compromise
  7. Software updates
  8. Scareware
  9. Social Engineering
  10. Backups
  11. Virus
  12. Exploit
  13. Spear phishing
  14. Multi-factor authentication (MFA)
  15. APT (Advanced Persistent Threat)
  16. Ransomware
  17. Training
  18. Cyber Hygiene
  19. Intrusion
  20. IPS (Intrusion Prevention System)
  21. Phishing
  22. Zero-day
  23. Personally identifiable information (PII)
  24. Patch
  25. Screen lock policy
  26. Breach
  27. Threat Actor
  28. Security Policy
  29. Dark web
  30. Botnet
  31. Hashing
  32. Cyberattack
  33. Incident Response
  34. Penetration Testing
  35. Data Loss Prevention (DLP)
  36. Honeypot
  37. Malware
  38. Threat Intelligence
  39. Compliance
  40. Insider Threat
  41. Encryption
  42. Risk Assessment
  43. Spoofing
  44. Trojan
  45. Digital Certificate
  46. IDS (Intrusion Detection System)
  47. Backdoor
  48. Vulnerability
  49. Endpoint
  50. Awareness