ThreatIntelligenceIncidentResponseRansomwareScarewareCyberHygieneScreenlockpolicyIPS(IntrusionPreventionSystem)ExploitReusingpasswordsSpoofingAwarenessAPT(AdvancedPersistentThreat)DarkwebCompromiseSecurityPolicyMulti-factorauthentication(MFA)MalwareSpearphishingHashingDigitalCertificateVulnerabilityInsiderThreatThreatZero-dayPatchIDS(IntrusionDetectionSystem)PhishingCyberattackWormEndpointBotnetIntrusionTrojanSoftwareupdatesTrainingThreatActorComplianceBackupsRiskAssessmentData LossPrevention(DLP)EncryptionBackdoorVirusSandboxBreachSocialEngineeringPenetrationTestingPersonallyidentifiableinformation(PII)WhalephishingHoneypotThreatIntelligenceIncidentResponseRansomwareScarewareCyberHygieneScreenlockpolicyIPS(IntrusionPreventionSystem)ExploitReusingpasswordsSpoofingAwarenessAPT(AdvancedPersistentThreat)DarkwebCompromiseSecurityPolicyMulti-factorauthentication(MFA)MalwareSpearphishingHashingDigitalCertificateVulnerabilityInsiderThreatThreatZero-dayPatchIDS(IntrusionDetectionSystem)PhishingCyberattackWormEndpointBotnetIntrusionTrojanSoftwareupdatesTrainingThreatActorComplianceBackupsRiskAssessmentData LossPrevention(DLP)EncryptionBackdoorVirusSandboxBreachSocialEngineeringPenetrationTestingPersonallyidentifiableinformation(PII)WhalephishingHoneypot

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Threat Intelligence
  2. Incident Response
  3. Ransomware
  4. Scareware
  5. Cyber Hygiene
  6. Screen lock policy
  7. IPS (Intrusion Prevention System)
  8. Exploit
  9. Reusing passwords
  10. Spoofing
  11. Awareness
  12. APT (Advanced Persistent Threat)
  13. Dark web
  14. Compromise
  15. Security Policy
  16. Multi-factor authentication (MFA)
  17. Malware
  18. Spear phishing
  19. Hashing
  20. Digital Certificate
  21. Vulnerability
  22. Insider Threat
  23. Threat
  24. Zero-day
  25. Patch
  26. IDS (Intrusion Detection System)
  27. Phishing
  28. Cyberattack
  29. Worm
  30. Endpoint
  31. Botnet
  32. Intrusion
  33. Trojan
  34. Software updates
  35. Training
  36. Threat Actor
  37. Compliance
  38. Backups
  39. Risk Assessment
  40. Data Loss Prevention (DLP)
  41. Encryption
  42. Backdoor
  43. Virus
  44. Sandbox
  45. Breach
  46. Social Engineering
  47. Penetration Testing
  48. Personally identifiable information (PII)
  49. Whale phishing
  50. Honeypot