BotnetVirusMalwareSecurityPolicyVulnerabilityScreenlockpolicyData LossPrevention(DLP)AwarenessPenetrationTestingHoneypotIDS(IntrusionDetectionSystem)ThreatActorTrainingCyberattackSandboxHashingThreatRansomwareIntrusionTrojanComplianceExploitInsiderThreatPersonallyidentifiableinformation(PII)SpoofingThreatIntelligencePhishingAPT(AdvancedPersistentThreat)RiskAssessmentBackupsPatchZero-dayIPS(IntrusionPreventionSystem)SpearphishingMulti-factorauthentication(MFA)WhalephishingCompromiseWormBreachBackdoorEncryptionIncidentResponseDigitalCertificateCyberHygieneSoftwareupdatesScarewareEndpointReusingpasswordsSocialEngineeringDarkwebBotnetVirusMalwareSecurityPolicyVulnerabilityScreenlockpolicyData LossPrevention(DLP)AwarenessPenetrationTestingHoneypotIDS(IntrusionDetectionSystem)ThreatActorTrainingCyberattackSandboxHashingThreatRansomwareIntrusionTrojanComplianceExploitInsiderThreatPersonallyidentifiableinformation(PII)SpoofingThreatIntelligencePhishingAPT(AdvancedPersistentThreat)RiskAssessmentBackupsPatchZero-dayIPS(IntrusionPreventionSystem)SpearphishingMulti-factorauthentication(MFA)WhalephishingCompromiseWormBreachBackdoorEncryptionIncidentResponseDigitalCertificateCyberHygieneSoftwareupdatesScarewareEndpointReusingpasswordsSocialEngineeringDarkweb

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Botnet
  2. Virus
  3. Malware
  4. Security Policy
  5. Vulnerability
  6. Screen lock policy
  7. Data Loss Prevention (DLP)
  8. Awareness
  9. Penetration Testing
  10. Honeypot
  11. IDS (Intrusion Detection System)
  12. Threat Actor
  13. Training
  14. Cyberattack
  15. Sandbox
  16. Hashing
  17. Threat
  18. Ransomware
  19. Intrusion
  20. Trojan
  21. Compliance
  22. Exploit
  23. Insider Threat
  24. Personally identifiable information (PII)
  25. Spoofing
  26. Threat Intelligence
  27. Phishing
  28. APT (Advanced Persistent Threat)
  29. Risk Assessment
  30. Backups
  31. Patch
  32. Zero-day
  33. IPS (Intrusion Prevention System)
  34. Spear phishing
  35. Multi-factor authentication (MFA)
  36. Whale phishing
  37. Compromise
  38. Worm
  39. Breach
  40. Backdoor
  41. Encryption
  42. Incident Response
  43. Digital Certificate
  44. Cyber Hygiene
  45. Software updates
  46. Scareware
  47. Endpoint
  48. Reusing passwords
  49. Social Engineering
  50. Dark web