HoneypotExploitTrainingBackupsAwarenessCyberattackTrojanCompromiseEndpointMalwareDigitalCertificateCyberHygieneReusingpasswordsInsiderThreatData LossPrevention(DLP)RansomwareScreenlockpolicyVirusDarkwebSecurityPolicyThreatActorBreachAPT(AdvancedPersistentThreat)SpoofingMulti-factorauthentication(MFA)ThreatIntelligenceIPS(IntrusionPreventionSystem)PatchSpearphishingWhalephishingEncryptionBackdoorThreatSocialEngineeringHashingWormIncidentResponseIntrusionSandboxPersonallyidentifiableinformation(PII)SoftwareupdatesCompliancePenetrationTestingScarewareVulnerabilityPhishingIDS(IntrusionDetectionSystem)RiskAssessmentZero-dayBotnetHoneypotExploitTrainingBackupsAwarenessCyberattackTrojanCompromiseEndpointMalwareDigitalCertificateCyberHygieneReusingpasswordsInsiderThreatData LossPrevention(DLP)RansomwareScreenlockpolicyVirusDarkwebSecurityPolicyThreatActorBreachAPT(AdvancedPersistentThreat)SpoofingMulti-factorauthentication(MFA)ThreatIntelligenceIPS(IntrusionPreventionSystem)PatchSpearphishingWhalephishingEncryptionBackdoorThreatSocialEngineeringHashingWormIncidentResponseIntrusionSandboxPersonallyidentifiableinformation(PII)SoftwareupdatesCompliancePenetrationTestingScarewareVulnerabilityPhishingIDS(IntrusionDetectionSystem)RiskAssessmentZero-dayBotnet

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Honeypot
  2. Exploit
  3. Training
  4. Backups
  5. Awareness
  6. Cyberattack
  7. Trojan
  8. Compromise
  9. Endpoint
  10. Malware
  11. Digital Certificate
  12. Cyber Hygiene
  13. Reusing passwords
  14. Insider Threat
  15. Data Loss Prevention (DLP)
  16. Ransomware
  17. Screen lock policy
  18. Virus
  19. Dark web
  20. Security Policy
  21. Threat Actor
  22. Breach
  23. APT (Advanced Persistent Threat)
  24. Spoofing
  25. Multi-factor authentication (MFA)
  26. Threat Intelligence
  27. IPS (Intrusion Prevention System)
  28. Patch
  29. Spear phishing
  30. Whale phishing
  31. Encryption
  32. Backdoor
  33. Threat
  34. Social Engineering
  35. Hashing
  36. Worm
  37. Incident Response
  38. Intrusion
  39. Sandbox
  40. Personally identifiable information (PII)
  41. Software updates
  42. Compliance
  43. Penetration Testing
  44. Scareware
  45. Vulnerability
  46. Phishing
  47. IDS (Intrusion Detection System)
  48. Risk Assessment
  49. Zero-day
  50. Botnet