CyberHygieneBotnetHashingWhalephishingTrainingAwarenessThreatBackupsDigitalCertificateWormRansomwareEncryptionAPT(AdvancedPersistentThreat)ScreenlockpolicyTrojanHoneypotPhishingExploitInsiderThreatThreatActorScarewareSpearphishingDarkwebBreachVulnerabilityCompromiseIntrusionCyberattackMalwareThreatIntelligenceComplianceSpoofingIPS(IntrusionPreventionSystem)PatchEndpointSecurityPolicyZero-daySandboxPenetrationTestingSoftwareupdatesRiskAssessmentReusingpasswordsIncidentResponsePersonallyidentifiableinformation(PII)Multi-factorauthentication(MFA)BackdoorVirusIDS(IntrusionDetectionSystem)SocialEngineeringData LossPrevention(DLP)CyberHygieneBotnetHashingWhalephishingTrainingAwarenessThreatBackupsDigitalCertificateWormRansomwareEncryptionAPT(AdvancedPersistentThreat)ScreenlockpolicyTrojanHoneypotPhishingExploitInsiderThreatThreatActorScarewareSpearphishingDarkwebBreachVulnerabilityCompromiseIntrusionCyberattackMalwareThreatIntelligenceComplianceSpoofingIPS(IntrusionPreventionSystem)PatchEndpointSecurityPolicyZero-daySandboxPenetrationTestingSoftwareupdatesRiskAssessmentReusingpasswordsIncidentResponsePersonallyidentifiableinformation(PII)Multi-factorauthentication(MFA)BackdoorVirusIDS(IntrusionDetectionSystem)SocialEngineeringData LossPrevention(DLP)

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Cyber Hygiene
  2. Botnet
  3. Hashing
  4. Whale phishing
  5. Training
  6. Awareness
  7. Threat
  8. Backups
  9. Digital Certificate
  10. Worm
  11. Ransomware
  12. Encryption
  13. APT (Advanced Persistent Threat)
  14. Screen lock policy
  15. Trojan
  16. Honeypot
  17. Phishing
  18. Exploit
  19. Insider Threat
  20. Threat Actor
  21. Scareware
  22. Spear phishing
  23. Dark web
  24. Breach
  25. Vulnerability
  26. Compromise
  27. Intrusion
  28. Cyberattack
  29. Malware
  30. Threat Intelligence
  31. Compliance
  32. Spoofing
  33. IPS (Intrusion Prevention System)
  34. Patch
  35. Endpoint
  36. Security Policy
  37. Zero-day
  38. Sandbox
  39. Penetration Testing
  40. Software updates
  41. Risk Assessment
  42. Reusing passwords
  43. Incident Response
  44. Personally identifiable information (PII)
  45. Multi-factor authentication (MFA)
  46. Backdoor
  47. Virus
  48. IDS (Intrusion Detection System)
  49. Social Engineering
  50. Data Loss Prevention (DLP)