WormIntrusionAwarenessThreatActorPersonallyidentifiableinformation(PII)BreachCyberattackEndpointRansomwareEncryptionPhishingIPS(IntrusionPreventionSystem)DarkwebSpoofingVirusScreenlockpolicyReusingpasswordsBackdoorInsiderThreatCyberHygieneIncidentResponsePenetrationTestingTrainingComplianceAPT(AdvancedPersistentThreat)Data LossPrevention(DLP)DigitalCertificateHashingSpearphishingMulti-factorauthentication(MFA)SoftwareupdatesCompromiseBackupsBotnetExploitIDS(IntrusionDetectionSystem)RiskAssessmentSocialEngineeringHoneypotTrojanPatchScarewareSandboxThreatIntelligenceMalwareWhalephishingZero-dayVulnerabilitySecurityPolicyThreatWormIntrusionAwarenessThreatActorPersonallyidentifiableinformation(PII)BreachCyberattackEndpointRansomwareEncryptionPhishingIPS(IntrusionPreventionSystem)DarkwebSpoofingVirusScreenlockpolicyReusingpasswordsBackdoorInsiderThreatCyberHygieneIncidentResponsePenetrationTestingTrainingComplianceAPT(AdvancedPersistentThreat)Data LossPrevention(DLP)DigitalCertificateHashingSpearphishingMulti-factorauthentication(MFA)SoftwareupdatesCompromiseBackupsBotnetExploitIDS(IntrusionDetectionSystem)RiskAssessmentSocialEngineeringHoneypotTrojanPatchScarewareSandboxThreatIntelligenceMalwareWhalephishingZero-dayVulnerabilitySecurityPolicyThreat

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Worm
  2. Intrusion
  3. Awareness
  4. Threat Actor
  5. Personally identifiable information (PII)
  6. Breach
  7. Cyberattack
  8. Endpoint
  9. Ransomware
  10. Encryption
  11. Phishing
  12. IPS (Intrusion Prevention System)
  13. Dark web
  14. Spoofing
  15. Virus
  16. Screen lock policy
  17. Reusing passwords
  18. Backdoor
  19. Insider Threat
  20. Cyber Hygiene
  21. Incident Response
  22. Penetration Testing
  23. Training
  24. Compliance
  25. APT (Advanced Persistent Threat)
  26. Data Loss Prevention (DLP)
  27. Digital Certificate
  28. Hashing
  29. Spear phishing
  30. Multi-factor authentication (MFA)
  31. Software updates
  32. Compromise
  33. Backups
  34. Botnet
  35. Exploit
  36. IDS (Intrusion Detection System)
  37. Risk Assessment
  38. Social Engineering
  39. Honeypot
  40. Trojan
  41. Patch
  42. Scareware
  43. Sandbox
  44. Threat Intelligence
  45. Malware
  46. Whale phishing
  47. Zero-day
  48. Vulnerability
  49. Security Policy
  50. Threat