ThreatExploitRiskAssessmentRansomwareScarewareAwarenessCyberattackSandboxDigitalCertificateHoneypotCompromiseSecurityPolicyMulti-factorauthentication(MFA)WhalephishingDarkwebMalwareEncryptionBackupsIDS(IntrusionDetectionSystem)PenetrationTestingBreachSpoofingTrainingReusingpasswordsIntrusionAPT(AdvancedPersistentThreat)SocialEngineeringVulnerabilityEndpointBackdoorPhishingData LossPrevention(DLP)SoftwareupdatesPatchIPS(IntrusionPreventionSystem)HashingScreenlockpolicyBotnetIncidentResponseWormThreatIntelligencePersonallyidentifiableinformation(PII)ComplianceThreatActorSpearphishingInsiderThreatVirusTrojanCyberHygieneZero-dayThreatExploitRiskAssessmentRansomwareScarewareAwarenessCyberattackSandboxDigitalCertificateHoneypotCompromiseSecurityPolicyMulti-factorauthentication(MFA)WhalephishingDarkwebMalwareEncryptionBackupsIDS(IntrusionDetectionSystem)PenetrationTestingBreachSpoofingTrainingReusingpasswordsIntrusionAPT(AdvancedPersistentThreat)SocialEngineeringVulnerabilityEndpointBackdoorPhishingData LossPrevention(DLP)SoftwareupdatesPatchIPS(IntrusionPreventionSystem)HashingScreenlockpolicyBotnetIncidentResponseWormThreatIntelligencePersonallyidentifiableinformation(PII)ComplianceThreatActorSpearphishingInsiderThreatVirusTrojanCyberHygieneZero-day

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Threat
  2. Exploit
  3. Risk Assessment
  4. Ransomware
  5. Scareware
  6. Awareness
  7. Cyberattack
  8. Sandbox
  9. Digital Certificate
  10. Honeypot
  11. Compromise
  12. Security Policy
  13. Multi-factor authentication (MFA)
  14. Whale phishing
  15. Dark web
  16. Malware
  17. Encryption
  18. Backups
  19. IDS (Intrusion Detection System)
  20. Penetration Testing
  21. Breach
  22. Spoofing
  23. Training
  24. Reusing passwords
  25. Intrusion
  26. APT (Advanced Persistent Threat)
  27. Social Engineering
  28. Vulnerability
  29. Endpoint
  30. Backdoor
  31. Phishing
  32. Data Loss Prevention (DLP)
  33. Software updates
  34. Patch
  35. IPS (Intrusion Prevention System)
  36. Hashing
  37. Screen lock policy
  38. Botnet
  39. Incident Response
  40. Worm
  41. Threat Intelligence
  42. Personally identifiable information (PII)
  43. Compliance
  44. Threat Actor
  45. Spear phishing
  46. Insider Threat
  47. Virus
  48. Trojan
  49. Cyber Hygiene
  50. Zero-day