WhalephishingAPT(AdvancedPersistentThreat)ComplianceHashingSpearphishingZero-dayPersonallyidentifiableinformation(PII)ReusingpasswordsRansomwareVulnerabilityPenetrationTestingIncidentResponseEndpointBackupsRiskAssessmentThreatThreatActorIntrusionCompromiseIPS(IntrusionPreventionSystem)WormScreenlockpolicyHoneypotAwarenessBackdoorIDS(IntrusionDetectionSystem)SoftwareupdatesSandboxBotnetMulti-factorauthentication(MFA)DigitalCertificateData LossPrevention(DLP)PatchMalwareSocialEngineeringSecurityPolicyTrainingVirusScarewareTrojanCyberHygieneInsiderThreatSpoofingPhishingCyberattackDarkwebBreachEncryptionThreatIntelligenceExploitWhalephishingAPT(AdvancedPersistentThreat)ComplianceHashingSpearphishingZero-dayPersonallyidentifiableinformation(PII)ReusingpasswordsRansomwareVulnerabilityPenetrationTestingIncidentResponseEndpointBackupsRiskAssessmentThreatThreatActorIntrusionCompromiseIPS(IntrusionPreventionSystem)WormScreenlockpolicyHoneypotAwarenessBackdoorIDS(IntrusionDetectionSystem)SoftwareupdatesSandboxBotnetMulti-factorauthentication(MFA)DigitalCertificateData LossPrevention(DLP)PatchMalwareSocialEngineeringSecurityPolicyTrainingVirusScarewareTrojanCyberHygieneInsiderThreatSpoofingPhishingCyberattackDarkwebBreachEncryptionThreatIntelligenceExploit

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Whale phishing
  2. APT (Advanced Persistent Threat)
  3. Compliance
  4. Hashing
  5. Spear phishing
  6. Zero-day
  7. Personally identifiable information (PII)
  8. Reusing passwords
  9. Ransomware
  10. Vulnerability
  11. Penetration Testing
  12. Incident Response
  13. Endpoint
  14. Backups
  15. Risk Assessment
  16. Threat
  17. Threat Actor
  18. Intrusion
  19. Compromise
  20. IPS (Intrusion Prevention System)
  21. Worm
  22. Screen lock policy
  23. Honeypot
  24. Awareness
  25. Backdoor
  26. IDS (Intrusion Detection System)
  27. Software updates
  28. Sandbox
  29. Botnet
  30. Multi-factor authentication (MFA)
  31. Digital Certificate
  32. Data Loss Prevention (DLP)
  33. Patch
  34. Malware
  35. Social Engineering
  36. Security Policy
  37. Training
  38. Virus
  39. Scareware
  40. Trojan
  41. Cyber Hygiene
  42. Insider Threat
  43. Spoofing
  44. Phishing
  45. Cyberattack
  46. Dark web
  47. Breach
  48. Encryption
  49. Threat Intelligence
  50. Exploit