SocialEngineeringBackupsIncidentResponseRiskAssessmentCompromiseEndpointVirusWormScreenlockpolicySpoofingIntrusionAPT(AdvancedPersistentThreat)BackdoorSoftwareupdatesTrainingHoneypotBreachPatchTrojanAwarenessVulnerabilityHashingPersonallyidentifiableinformation(PII)ThreatCyberHygieneEncryptionPhishingIDS(IntrusionDetectionSystem)ThreatIntelligenceComplianceZero-dayDigitalCertificatePenetrationTestingRansomwareThreatActorScarewareSpearphishingWhalephishingData LossPrevention(DLP)SandboxCyberattackSecurityPolicyBotnetMalwareReusingpasswordsDarkwebExploitIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)InsiderThreatSocialEngineeringBackupsIncidentResponseRiskAssessmentCompromiseEndpointVirusWormScreenlockpolicySpoofingIntrusionAPT(AdvancedPersistentThreat)BackdoorSoftwareupdatesTrainingHoneypotBreachPatchTrojanAwarenessVulnerabilityHashingPersonallyidentifiableinformation(PII)ThreatCyberHygieneEncryptionPhishingIDS(IntrusionDetectionSystem)ThreatIntelligenceComplianceZero-dayDigitalCertificatePenetrationTestingRansomwareThreatActorScarewareSpearphishingWhalephishingData LossPrevention(DLP)SandboxCyberattackSecurityPolicyBotnetMalwareReusingpasswordsDarkwebExploitIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)InsiderThreat

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Social Engineering
  2. Backups
  3. Incident Response
  4. Risk Assessment
  5. Compromise
  6. Endpoint
  7. Virus
  8. Worm
  9. Screen lock policy
  10. Spoofing
  11. Intrusion
  12. APT (Advanced Persistent Threat)
  13. Backdoor
  14. Software updates
  15. Training
  16. Honeypot
  17. Breach
  18. Patch
  19. Trojan
  20. Awareness
  21. Vulnerability
  22. Hashing
  23. Personally identifiable information (PII)
  24. Threat
  25. Cyber Hygiene
  26. Encryption
  27. Phishing
  28. IDS (Intrusion Detection System)
  29. Threat Intelligence
  30. Compliance
  31. Zero-day
  32. Digital Certificate
  33. Penetration Testing
  34. Ransomware
  35. Threat Actor
  36. Scareware
  37. Spear phishing
  38. Whale phishing
  39. Data Loss Prevention (DLP)
  40. Sandbox
  41. Cyberattack
  42. Security Policy
  43. Botnet
  44. Malware
  45. Reusing passwords
  46. Dark web
  47. Exploit
  48. IPS (Intrusion Prevention System)
  49. Multi-factor authentication (MFA)
  50. Insider Threat