WormVirusPersonallyidentifiableinformation(PII)Zero-dayExploitVulnerabilitySecurityPolicyDigitalCertificateBotnetTrojanDarkwebBackdoorThreatIntelligenceAwarenessIDS(IntrusionDetectionSystem)WhalephishingComplianceReusingpasswordsEncryptionMalwareHoneypotData LossPrevention(DLP)SoftwareupdatesBackupsCyberHygieneHashingIPS(IntrusionPreventionSystem)APT(AdvancedPersistentThreat)CyberattackSpoofingRiskAssessmentIncidentResponseScreenlockpolicyMulti-factorauthentication(MFA)IntrusionTrainingThreatSocialEngineeringPhishingThreatActorSandboxSpearphishingInsiderThreatEndpointScarewarePenetrationTestingRansomwarePatchBreachCompromiseWormVirusPersonallyidentifiableinformation(PII)Zero-dayExploitVulnerabilitySecurityPolicyDigitalCertificateBotnetTrojanDarkwebBackdoorThreatIntelligenceAwarenessIDS(IntrusionDetectionSystem)WhalephishingComplianceReusingpasswordsEncryptionMalwareHoneypotData LossPrevention(DLP)SoftwareupdatesBackupsCyberHygieneHashingIPS(IntrusionPreventionSystem)APT(AdvancedPersistentThreat)CyberattackSpoofingRiskAssessmentIncidentResponseScreenlockpolicyMulti-factorauthentication(MFA)IntrusionTrainingThreatSocialEngineeringPhishingThreatActorSandboxSpearphishingInsiderThreatEndpointScarewarePenetrationTestingRansomwarePatchBreachCompromise

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Worm
  2. Virus
  3. Personally identifiable information (PII)
  4. Zero-day
  5. Exploit
  6. Vulnerability
  7. Security Policy
  8. Digital Certificate
  9. Botnet
  10. Trojan
  11. Dark web
  12. Backdoor
  13. Threat Intelligence
  14. Awareness
  15. IDS (Intrusion Detection System)
  16. Whale phishing
  17. Compliance
  18. Reusing passwords
  19. Encryption
  20. Malware
  21. Honeypot
  22. Data Loss Prevention (DLP)
  23. Software updates
  24. Backups
  25. Cyber Hygiene
  26. Hashing
  27. IPS (Intrusion Prevention System)
  28. APT (Advanced Persistent Threat)
  29. Cyberattack
  30. Spoofing
  31. Risk Assessment
  32. Incident Response
  33. Screen lock policy
  34. Multi-factor authentication (MFA)
  35. Intrusion
  36. Training
  37. Threat
  38. Social Engineering
  39. Phishing
  40. Threat Actor
  41. Sandbox
  42. Spear phishing
  43. Insider Threat
  44. Endpoint
  45. Scareware
  46. Penetration Testing
  47. Ransomware
  48. Patch
  49. Breach
  50. Compromise