ScreenlockpolicyComplianceSpoofingSandboxRansomwareIntrusionRiskAssessmentBackdoorMulti-factorauthentication(MFA)EndpointIPS(IntrusionPreventionSystem)TrainingWhalephishingThreatTrojanVirusPatchMalwareBackupsData LossPrevention(DLP)VulnerabilityEncryptionSpearphishingDigitalCertificateExploitThreatIntelligenceCompromisePhishingScarewareSecurityPolicyHoneypotBreachSoftwareupdatesAPT(AdvancedPersistentThreat)SocialEngineeringAwarenessZero-dayWormCyberHygieneIncidentResponsePenetrationTestingPersonallyidentifiableinformation(PII)IDS(IntrusionDetectionSystem)ThreatActorHashingDarkwebBotnetReusingpasswordsInsiderThreatCyberattackScreenlockpolicyComplianceSpoofingSandboxRansomwareIntrusionRiskAssessmentBackdoorMulti-factorauthentication(MFA)EndpointIPS(IntrusionPreventionSystem)TrainingWhalephishingThreatTrojanVirusPatchMalwareBackupsData LossPrevention(DLP)VulnerabilityEncryptionSpearphishingDigitalCertificateExploitThreatIntelligenceCompromisePhishingScarewareSecurityPolicyHoneypotBreachSoftwareupdatesAPT(AdvancedPersistentThreat)SocialEngineeringAwarenessZero-dayWormCyberHygieneIncidentResponsePenetrationTestingPersonallyidentifiableinformation(PII)IDS(IntrusionDetectionSystem)ThreatActorHashingDarkwebBotnetReusingpasswordsInsiderThreatCyberattack

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Screen lock policy
  2. Compliance
  3. Spoofing
  4. Sandbox
  5. Ransomware
  6. Intrusion
  7. Risk Assessment
  8. Backdoor
  9. Multi-factor authentication (MFA)
  10. Endpoint
  11. IPS (Intrusion Prevention System)
  12. Training
  13. Whale phishing
  14. Threat
  15. Trojan
  16. Virus
  17. Patch
  18. Malware
  19. Backups
  20. Data Loss Prevention (DLP)
  21. Vulnerability
  22. Encryption
  23. Spear phishing
  24. Digital Certificate
  25. Exploit
  26. Threat Intelligence
  27. Compromise
  28. Phishing
  29. Scareware
  30. Security Policy
  31. Honeypot
  32. Breach
  33. Software updates
  34. APT (Advanced Persistent Threat)
  35. Social Engineering
  36. Awareness
  37. Zero-day
  38. Worm
  39. Cyber Hygiene
  40. Incident Response
  41. Penetration Testing
  42. Personally identifiable information (PII)
  43. IDS (Intrusion Detection System)
  44. Threat Actor
  45. Hashing
  46. Dark web
  47. Botnet
  48. Reusing passwords
  49. Insider Threat
  50. Cyberattack