ThreatIntelligenceIntrusionAPT(AdvancedPersistentThreat)CyberattackBackdoorMulti-factorauthentication(MFA)WormSoftwareupdatesScarewareMalwareSocialEngineeringBackupsTrojanScreenlockpolicyHashingDigitalCertificateDarkwebPatchSandboxTrainingSecurityPolicyZero-dayInsiderThreatComplianceCyberHygieneIncidentResponseExploitPhishingHoneypotData LossPrevention(DLP)ReusingpasswordsBreachEncryptionWhalephishingVulnerabilitySpoofingVirusThreatIPS(IntrusionPreventionSystem)AwarenessBotnetIDS(IntrusionDetectionSystem)RansomwareThreatActorPersonallyidentifiableinformation(PII)EndpointCompromiseRiskAssessmentPenetrationTestingSpearphishingThreatIntelligenceIntrusionAPT(AdvancedPersistentThreat)CyberattackBackdoorMulti-factorauthentication(MFA)WormSoftwareupdatesScarewareMalwareSocialEngineeringBackupsTrojanScreenlockpolicyHashingDigitalCertificateDarkwebPatchSandboxTrainingSecurityPolicyZero-dayInsiderThreatComplianceCyberHygieneIncidentResponseExploitPhishingHoneypotData LossPrevention(DLP)ReusingpasswordsBreachEncryptionWhalephishingVulnerabilitySpoofingVirusThreatIPS(IntrusionPreventionSystem)AwarenessBotnetIDS(IntrusionDetectionSystem)RansomwareThreatActorPersonallyidentifiableinformation(PII)EndpointCompromiseRiskAssessmentPenetrationTestingSpearphishing

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Threat Intelligence
  2. Intrusion
  3. APT (Advanced Persistent Threat)
  4. Cyberattack
  5. Backdoor
  6. Multi-factor authentication (MFA)
  7. Worm
  8. Software updates
  9. Scareware
  10. Malware
  11. Social Engineering
  12. Backups
  13. Trojan
  14. Screen lock policy
  15. Hashing
  16. Digital Certificate
  17. Dark web
  18. Patch
  19. Sandbox
  20. Training
  21. Security Policy
  22. Zero-day
  23. Insider Threat
  24. Compliance
  25. Cyber Hygiene
  26. Incident Response
  27. Exploit
  28. Phishing
  29. Honeypot
  30. Data Loss Prevention (DLP)
  31. Reusing passwords
  32. Breach
  33. Encryption
  34. Whale phishing
  35. Vulnerability
  36. Spoofing
  37. Virus
  38. Threat
  39. IPS (Intrusion Prevention System)
  40. Awareness
  41. Botnet
  42. IDS (Intrusion Detection System)
  43. Ransomware
  44. Threat Actor
  45. Personally identifiable information (PII)
  46. Endpoint
  47. Compromise
  48. Risk Assessment
  49. Penetration Testing
  50. Spear phishing