BackdoorPatchWhalephishingSocialEngineeringCompromiseIPS(IntrusionPreventionSystem)AwarenessCyberHygieneBreachPhishingZero-dayTrainingReusingpasswordsIncidentResponseSpearphishingDigitalCertificateRiskAssessmentPersonallyidentifiableinformation(PII)InsiderThreatThreatWormExploitSecurityPolicyMulti-factorauthentication(MFA)MalwareThreatIntelligenceEncryptionData LossPrevention(DLP)IDS(IntrusionDetectionSystem)SpoofingComplianceHoneypotBotnetCyberattackVulnerabilityScreenlockpolicyDarkwebSandboxHashingThreatActorEndpointRansomwareIntrusionPenetrationTestingScarewareBackupsVirusTrojanSoftwareupdatesAPT(AdvancedPersistentThreat)BackdoorPatchWhalephishingSocialEngineeringCompromiseIPS(IntrusionPreventionSystem)AwarenessCyberHygieneBreachPhishingZero-dayTrainingReusingpasswordsIncidentResponseSpearphishingDigitalCertificateRiskAssessmentPersonallyidentifiableinformation(PII)InsiderThreatThreatWormExploitSecurityPolicyMulti-factorauthentication(MFA)MalwareThreatIntelligenceEncryptionData LossPrevention(DLP)IDS(IntrusionDetectionSystem)SpoofingComplianceHoneypotBotnetCyberattackVulnerabilityScreenlockpolicyDarkwebSandboxHashingThreatActorEndpointRansomwareIntrusionPenetrationTestingScarewareBackupsVirusTrojanSoftwareupdatesAPT(AdvancedPersistentThreat)

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Backdoor
  2. Patch
  3. Whale phishing
  4. Social Engineering
  5. Compromise
  6. IPS (Intrusion Prevention System)
  7. Awareness
  8. Cyber Hygiene
  9. Breach
  10. Phishing
  11. Zero-day
  12. Training
  13. Reusing passwords
  14. Incident Response
  15. Spear phishing
  16. Digital Certificate
  17. Risk Assessment
  18. Personally identifiable information (PII)
  19. Insider Threat
  20. Threat
  21. Worm
  22. Exploit
  23. Security Policy
  24. Multi-factor authentication (MFA)
  25. Malware
  26. Threat Intelligence
  27. Encryption
  28. Data Loss Prevention (DLP)
  29. IDS (Intrusion Detection System)
  30. Spoofing
  31. Compliance
  32. Honeypot
  33. Botnet
  34. Cyberattack
  35. Vulnerability
  36. Screen lock policy
  37. Dark web
  38. Sandbox
  39. Hashing
  40. Threat Actor
  41. Endpoint
  42. Ransomware
  43. Intrusion
  44. Penetration Testing
  45. Scareware
  46. Backups
  47. Virus
  48. Trojan
  49. Software updates
  50. APT (Advanced Persistent Threat)