Multi-factorauthentication(MFA)TrojanThreatIntelligenceSandboxVirusReusingpasswordsWormHoneypotData LossPrevention(DLP)WhalephishingRiskAssessmentPatchIncidentResponsePhishingBackdoorEndpointThreatExploitInsiderThreatSecurityPolicyIDS(IntrusionDetectionSystem)TrainingBackupsBotnetZero-daySoftwareupdatesMalwarePersonallyidentifiableinformation(PII)AwarenessHashingVulnerabilityCyberHygieneCompromiseRansomwarePenetrationTestingDarkwebEncryptionIntrusionAPT(AdvancedPersistentThreat)DigitalCertificateScreenlockpolicySpearphishingSpoofingIPS(IntrusionPreventionSystem)SocialEngineeringCyberattackThreatActorScarewareBreachComplianceMulti-factorauthentication(MFA)TrojanThreatIntelligenceSandboxVirusReusingpasswordsWormHoneypotData LossPrevention(DLP)WhalephishingRiskAssessmentPatchIncidentResponsePhishingBackdoorEndpointThreatExploitInsiderThreatSecurityPolicyIDS(IntrusionDetectionSystem)TrainingBackupsBotnetZero-daySoftwareupdatesMalwarePersonallyidentifiableinformation(PII)AwarenessHashingVulnerabilityCyberHygieneCompromiseRansomwarePenetrationTestingDarkwebEncryptionIntrusionAPT(AdvancedPersistentThreat)DigitalCertificateScreenlockpolicySpearphishingSpoofingIPS(IntrusionPreventionSystem)SocialEngineeringCyberattackThreatActorScarewareBreachCompliance

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Multi-factor authentication (MFA)
  2. Trojan
  3. Threat Intelligence
  4. Sandbox
  5. Virus
  6. Reusing passwords
  7. Worm
  8. Honeypot
  9. Data Loss Prevention (DLP)
  10. Whale phishing
  11. Risk Assessment
  12. Patch
  13. Incident Response
  14. Phishing
  15. Backdoor
  16. Endpoint
  17. Threat
  18. Exploit
  19. Insider Threat
  20. Security Policy
  21. IDS (Intrusion Detection System)
  22. Training
  23. Backups
  24. Botnet
  25. Zero-day
  26. Software updates
  27. Malware
  28. Personally identifiable information (PII)
  29. Awareness
  30. Hashing
  31. Vulnerability
  32. Cyber Hygiene
  33. Compromise
  34. Ransomware
  35. Penetration Testing
  36. Dark web
  37. Encryption
  38. Intrusion
  39. APT (Advanced Persistent Threat)
  40. Digital Certificate
  41. Screen lock policy
  42. Spear phishing
  43. Spoofing
  44. IPS (Intrusion Prevention System)
  45. Social Engineering
  46. Cyberattack
  47. Threat Actor
  48. Scareware
  49. Breach
  50. Compliance