IntrusionAwarenessPatchBreachThreatEndpointRiskAssessmentSocialEngineeringThreatActorMulti-factorauthentication(MFA)CyberattackScreenlockpolicyCompromiseRansomwareSoftwareupdatesEncryptionAPT(AdvancedPersistentThreat)ReusingpasswordsHashingPenetrationTestingIncidentResponsePersonallyidentifiableinformation(PII)SpoofingBotnetDigitalCertificateTrojanCyberHygieneExploitWhalephishingDarkwebBackdoorThreatIntelligenceData LossPrevention(DLP)MalwareComplianceSecurityPolicyWormInsiderThreatBackupsTrainingIDS(IntrusionDetectionSystem)PhishingSpearphishingVulnerabilityHoneypotVirusIPS(IntrusionPreventionSystem)SandboxZero-dayScarewareIntrusionAwarenessPatchBreachThreatEndpointRiskAssessmentSocialEngineeringThreatActorMulti-factorauthentication(MFA)CyberattackScreenlockpolicyCompromiseRansomwareSoftwareupdatesEncryptionAPT(AdvancedPersistentThreat)ReusingpasswordsHashingPenetrationTestingIncidentResponsePersonallyidentifiableinformation(PII)SpoofingBotnetDigitalCertificateTrojanCyberHygieneExploitWhalephishingDarkwebBackdoorThreatIntelligenceData LossPrevention(DLP)MalwareComplianceSecurityPolicyWormInsiderThreatBackupsTrainingIDS(IntrusionDetectionSystem)PhishingSpearphishingVulnerabilityHoneypotVirusIPS(IntrusionPreventionSystem)SandboxZero-dayScareware

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Intrusion
  2. Awareness
  3. Patch
  4. Breach
  5. Threat
  6. Endpoint
  7. Risk Assessment
  8. Social Engineering
  9. Threat Actor
  10. Multi-factor authentication (MFA)
  11. Cyberattack
  12. Screen lock policy
  13. Compromise
  14. Ransomware
  15. Software updates
  16. Encryption
  17. APT (Advanced Persistent Threat)
  18. Reusing passwords
  19. Hashing
  20. Penetration Testing
  21. Incident Response
  22. Personally identifiable information (PII)
  23. Spoofing
  24. Botnet
  25. Digital Certificate
  26. Trojan
  27. Cyber Hygiene
  28. Exploit
  29. Whale phishing
  30. Dark web
  31. Backdoor
  32. Threat Intelligence
  33. Data Loss Prevention (DLP)
  34. Malware
  35. Compliance
  36. Security Policy
  37. Worm
  38. Insider Threat
  39. Backups
  40. Training
  41. IDS (Intrusion Detection System)
  42. Phishing
  43. Spear phishing
  44. Vulnerability
  45. Honeypot
  46. Virus
  47. IPS (Intrusion Prevention System)
  48. Sandbox
  49. Zero-day
  50. Scareware