DigitalCertificateSpoofingMalwareCyberattackWormData LossPrevention(DLP)SoftwareupdatesTrainingPersonallyidentifiableinformation(PII)HoneypotReusingpasswordsThreatIntelligenceHashingRansomwareThreatBackupsScarewareComplianceBreachSocialEngineeringPhishingVirusPenetrationTestingSpearphishingDarkwebCyberHygieneIncidentResponseZero-dayPatchBackdoorIPS(IntrusionPreventionSystem)BotnetRiskAssessmentAPT(AdvancedPersistentThreat)TrojanIDS(IntrusionDetectionSystem)ScreenlockpolicyAwarenessSandboxMulti-factorauthentication(MFA)CompromiseThreatActorIntrusionVulnerabilityEncryptionEndpointWhalephishingExploitInsiderThreatSecurityPolicyDigitalCertificateSpoofingMalwareCyberattackWormData LossPrevention(DLP)SoftwareupdatesTrainingPersonallyidentifiableinformation(PII)HoneypotReusingpasswordsThreatIntelligenceHashingRansomwareThreatBackupsScarewareComplianceBreachSocialEngineeringPhishingVirusPenetrationTestingSpearphishingDarkwebCyberHygieneIncidentResponseZero-dayPatchBackdoorIPS(IntrusionPreventionSystem)BotnetRiskAssessmentAPT(AdvancedPersistentThreat)TrojanIDS(IntrusionDetectionSystem)ScreenlockpolicyAwarenessSandboxMulti-factorauthentication(MFA)CompromiseThreatActorIntrusionVulnerabilityEncryptionEndpointWhalephishingExploitInsiderThreatSecurityPolicy

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Digital Certificate
  2. Spoofing
  3. Malware
  4. Cyberattack
  5. Worm
  6. Data Loss Prevention (DLP)
  7. Software updates
  8. Training
  9. Personally identifiable information (PII)
  10. Honeypot
  11. Reusing passwords
  12. Threat Intelligence
  13. Hashing
  14. Ransomware
  15. Threat
  16. Backups
  17. Scareware
  18. Compliance
  19. Breach
  20. Social Engineering
  21. Phishing
  22. Virus
  23. Penetration Testing
  24. Spear phishing
  25. Dark web
  26. Cyber Hygiene
  27. Incident Response
  28. Zero-day
  29. Patch
  30. Backdoor
  31. IPS (Intrusion Prevention System)
  32. Botnet
  33. Risk Assessment
  34. APT (Advanced Persistent Threat)
  35. Trojan
  36. IDS (Intrusion Detection System)
  37. Screen lock policy
  38. Awareness
  39. Sandbox
  40. Multi-factor authentication (MFA)
  41. Compromise
  42. Threat Actor
  43. Intrusion
  44. Vulnerability
  45. Encryption
  46. Endpoint
  47. Whale phishing
  48. Exploit
  49. Insider Threat
  50. Security Policy