BreachMalwareTrojanDarkwebRansomwareThreatIntelligencePenetrationTestingScreenlockpolicyVirusPhishingIntrusionSoftwareupdatesZero-dayCompromiseCyberHygieneComplianceSpoofingIDS(IntrusionDetectionSystem)PatchThreatActorReusingpasswordsSandboxInsiderThreatIPS(IntrusionPreventionSystem)DigitalCertificateHoneypotVulnerabilityBotnetMulti-factorauthentication(MFA)CyberattackExploitThreatEndpointBackupsRiskAssessmentSpearphishingSocialEngineeringAPT(AdvancedPersistentThreat)EncryptionScarewareAwarenessIncidentResponseTrainingSecurityPolicyWhalephishingHashingBackdoorPersonallyidentifiableinformation(PII)WormData LossPrevention(DLP)BreachMalwareTrojanDarkwebRansomwareThreatIntelligencePenetrationTestingScreenlockpolicyVirusPhishingIntrusionSoftwareupdatesZero-dayCompromiseCyberHygieneComplianceSpoofingIDS(IntrusionDetectionSystem)PatchThreatActorReusingpasswordsSandboxInsiderThreatIPS(IntrusionPreventionSystem)DigitalCertificateHoneypotVulnerabilityBotnetMulti-factorauthentication(MFA)CyberattackExploitThreatEndpointBackupsRiskAssessmentSpearphishingSocialEngineeringAPT(AdvancedPersistentThreat)EncryptionScarewareAwarenessIncidentResponseTrainingSecurityPolicyWhalephishingHashingBackdoorPersonallyidentifiableinformation(PII)WormData LossPrevention(DLP)

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Breach
  2. Malware
  3. Trojan
  4. Dark web
  5. Ransomware
  6. Threat Intelligence
  7. Penetration Testing
  8. Screen lock policy
  9. Virus
  10. Phishing
  11. Intrusion
  12. Software updates
  13. Zero-day
  14. Compromise
  15. Cyber Hygiene
  16. Compliance
  17. Spoofing
  18. IDS (Intrusion Detection System)
  19. Patch
  20. Threat Actor
  21. Reusing passwords
  22. Sandbox
  23. Insider Threat
  24. IPS (Intrusion Prevention System)
  25. Digital Certificate
  26. Honeypot
  27. Vulnerability
  28. Botnet
  29. Multi-factor authentication (MFA)
  30. Cyberattack
  31. Exploit
  32. Threat
  33. Endpoint
  34. Backups
  35. Risk Assessment
  36. Spear phishing
  37. Social Engineering
  38. APT (Advanced Persistent Threat)
  39. Encryption
  40. Scareware
  41. Awareness
  42. Incident Response
  43. Training
  44. Security Policy
  45. Whale phishing
  46. Hashing
  47. Backdoor
  48. Personally identifiable information (PII)
  49. Worm
  50. Data Loss Prevention (DLP)