Personallyidentifiableinformation(PII)TrainingVirusComplianceAwarenessInsiderThreatRansomwarePenetrationTestingMulti-factorauthentication(MFA)ExploitThreatCompromiseScarewareHoneypotPhishingSoftwareupdatesThreatIntelligenceBackupsZero-dayBreachPatchSpearphishingHashingSecurityPolicyCyberattackBackdoorIntrusionReusingpasswordsSandboxScreenlockpolicyDarkwebIncidentResponseVulnerabilityData LossPrevention(DLP)DigitalCertificateCyberHygieneTrojanSpoofingSocialEngineeringRiskAssessmentIDS(IntrusionDetectionSystem)WormMalwareEncryptionEndpointThreatActorAPT(AdvancedPersistentThreat)WhalephishingBotnetIPS(IntrusionPreventionSystem)Personallyidentifiableinformation(PII)TrainingVirusComplianceAwarenessInsiderThreatRansomwarePenetrationTestingMulti-factorauthentication(MFA)ExploitThreatCompromiseScarewareHoneypotPhishingSoftwareupdatesThreatIntelligenceBackupsZero-dayBreachPatchSpearphishingHashingSecurityPolicyCyberattackBackdoorIntrusionReusingpasswordsSandboxScreenlockpolicyDarkwebIncidentResponseVulnerabilityData LossPrevention(DLP)DigitalCertificateCyberHygieneTrojanSpoofingSocialEngineeringRiskAssessmentIDS(IntrusionDetectionSystem)WormMalwareEncryptionEndpointThreatActorAPT(AdvancedPersistentThreat)WhalephishingBotnetIPS(IntrusionPreventionSystem)

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Personally identifiable information (PII)
  2. Training
  3. Virus
  4. Compliance
  5. Awareness
  6. Insider Threat
  7. Ransomware
  8. Penetration Testing
  9. Multi-factor authentication (MFA)
  10. Exploit
  11. Threat
  12. Compromise
  13. Scareware
  14. Honeypot
  15. Phishing
  16. Software updates
  17. Threat Intelligence
  18. Backups
  19. Zero-day
  20. Breach
  21. Patch
  22. Spear phishing
  23. Hashing
  24. Security Policy
  25. Cyberattack
  26. Backdoor
  27. Intrusion
  28. Reusing passwords
  29. Sandbox
  30. Screen lock policy
  31. Dark web
  32. Incident Response
  33. Vulnerability
  34. Data Loss Prevention (DLP)
  35. Digital Certificate
  36. Cyber Hygiene
  37. Trojan
  38. Spoofing
  39. Social Engineering
  40. Risk Assessment
  41. IDS (Intrusion Detection System)
  42. Worm
  43. Malware
  44. Encryption
  45. Endpoint
  46. Threat Actor
  47. APT (Advanced Persistent Threat)
  48. Whale phishing
  49. Botnet
  50. IPS (Intrusion Prevention System)