ComplianceCompromisePersonallyidentifiableinformation(PII)WhalephishingAwarenessRansomwareScarewareVulnerabilityRiskAssessmentTrojanIPS(IntrusionPreventionSystem)SandboxBotnetWormSpoofingVirusDigitalCertificateBackupsHoneypotTrainingSpearphishingDarkwebIncidentResponseThreatActorMalwareCyberHygieneSecurityPolicyThreatSocialEngineeringAPT(AdvancedPersistentThreat)SoftwareupdatesBreachPhishingEndpointPenetrationTestingInsiderThreatExploitReusingpasswordsIntrusionCyberattackHashingEncryptionMulti-factorauthentication(MFA)Data LossPrevention(DLP)IDS(IntrusionDetectionSystem)BackdoorThreatIntelligencePatchScreenlockpolicyZero-dayComplianceCompromisePersonallyidentifiableinformation(PII)WhalephishingAwarenessRansomwareScarewareVulnerabilityRiskAssessmentTrojanIPS(IntrusionPreventionSystem)SandboxBotnetWormSpoofingVirusDigitalCertificateBackupsHoneypotTrainingSpearphishingDarkwebIncidentResponseThreatActorMalwareCyberHygieneSecurityPolicyThreatSocialEngineeringAPT(AdvancedPersistentThreat)SoftwareupdatesBreachPhishingEndpointPenetrationTestingInsiderThreatExploitReusingpasswordsIntrusionCyberattackHashingEncryptionMulti-factorauthentication(MFA)Data LossPrevention(DLP)IDS(IntrusionDetectionSystem)BackdoorThreatIntelligencePatchScreenlockpolicyZero-day

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Compliance
  2. Compromise
  3. Personally identifiable information (PII)
  4. Whale phishing
  5. Awareness
  6. Ransomware
  7. Scareware
  8. Vulnerability
  9. Risk Assessment
  10. Trojan
  11. IPS (Intrusion Prevention System)
  12. Sandbox
  13. Botnet
  14. Worm
  15. Spoofing
  16. Virus
  17. Digital Certificate
  18. Backups
  19. Honeypot
  20. Training
  21. Spear phishing
  22. Dark web
  23. Incident Response
  24. Threat Actor
  25. Malware
  26. Cyber Hygiene
  27. Security Policy
  28. Threat
  29. Social Engineering
  30. APT (Advanced Persistent Threat)
  31. Software updates
  32. Breach
  33. Phishing
  34. Endpoint
  35. Penetration Testing
  36. Insider Threat
  37. Exploit
  38. Reusing passwords
  39. Intrusion
  40. Cyberattack
  41. Hashing
  42. Encryption
  43. Multi-factor authentication (MFA)
  44. Data Loss Prevention (DLP)
  45. IDS (Intrusion Detection System)
  46. Backdoor
  47. Threat Intelligence
  48. Patch
  49. Screen lock policy
  50. Zero-day