DigitalCertificateCyberattackSocialEngineeringMulti-factorauthentication(MFA)CompromiseTrojanComplianceWhalephishingSandboxThreatSecurityPolicyPatchRansomwareSoftwareupdatesInsiderThreatSpearphishingReusingpasswordsHashingScarewarePenetrationTestingHoneypotWormPersonallyidentifiableinformation(PII)Data LossPrevention(DLP)BackupsIntrusionIDS(IntrusionDetectionSystem)AwarenessExploitBackdoorPhishingScreenlockpolicyTrainingEncryptionDarkwebIncidentResponseEndpointIPS(IntrusionPreventionSystem)BotnetThreatActorBreachCyberHygieneSpoofingRiskAssessmentVirusZero-dayThreatIntelligenceAPT(AdvancedPersistentThreat)MalwareVulnerabilityDigitalCertificateCyberattackSocialEngineeringMulti-factorauthentication(MFA)CompromiseTrojanComplianceWhalephishingSandboxThreatSecurityPolicyPatchRansomwareSoftwareupdatesInsiderThreatSpearphishingReusingpasswordsHashingScarewarePenetrationTestingHoneypotWormPersonallyidentifiableinformation(PII)Data LossPrevention(DLP)BackupsIntrusionIDS(IntrusionDetectionSystem)AwarenessExploitBackdoorPhishingScreenlockpolicyTrainingEncryptionDarkwebIncidentResponseEndpointIPS(IntrusionPreventionSystem)BotnetThreatActorBreachCyberHygieneSpoofingRiskAssessmentVirusZero-dayThreatIntelligenceAPT(AdvancedPersistentThreat)MalwareVulnerability

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Digital Certificate
  2. Cyberattack
  3. Social Engineering
  4. Multi-factor authentication (MFA)
  5. Compromise
  6. Trojan
  7. Compliance
  8. Whale phishing
  9. Sandbox
  10. Threat
  11. Security Policy
  12. Patch
  13. Ransomware
  14. Software updates
  15. Insider Threat
  16. Spear phishing
  17. Reusing passwords
  18. Hashing
  19. Scareware
  20. Penetration Testing
  21. Honeypot
  22. Worm
  23. Personally identifiable information (PII)
  24. Data Loss Prevention (DLP)
  25. Backups
  26. Intrusion
  27. IDS (Intrusion Detection System)
  28. Awareness
  29. Exploit
  30. Backdoor
  31. Phishing
  32. Screen lock policy
  33. Training
  34. Encryption
  35. Dark web
  36. Incident Response
  37. Endpoint
  38. IPS (Intrusion Prevention System)
  39. Botnet
  40. Threat Actor
  41. Breach
  42. Cyber Hygiene
  43. Spoofing
  44. Risk Assessment
  45. Virus
  46. Zero-day
  47. Threat Intelligence
  48. APT (Advanced Persistent Threat)
  49. Malware
  50. Vulnerability