EndpointPhishingBackdoorMalwareIPS(IntrusionPreventionSystem)VulnerabilityMulti-factorauthentication(MFA)SocialEngineeringIncidentResponseScreenlockpolicyRiskAssessmentThreatTrainingRansomwareZero-dayThreatIntelligenceWhalephishingSandboxData LossPrevention(DLP)DigitalCertificateCyberattackSpoofingIDS(IntrusionDetectionSystem)ScarewareSoftwareupdatesPatchEncryptionThreatActorSpearphishingExploitBreachWormVirusAPT(AdvancedPersistentThreat)Personallyidentifiableinformation(PII)BackupsReusingpasswordsCompromiseIntrusionTrojanPenetrationTestingCyberHygieneDarkwebAwarenessHoneypotSecurityPolicyHashingBotnetComplianceInsiderThreatEndpointPhishingBackdoorMalwareIPS(IntrusionPreventionSystem)VulnerabilityMulti-factorauthentication(MFA)SocialEngineeringIncidentResponseScreenlockpolicyRiskAssessmentThreatTrainingRansomwareZero-dayThreatIntelligenceWhalephishingSandboxData LossPrevention(DLP)DigitalCertificateCyberattackSpoofingIDS(IntrusionDetectionSystem)ScarewareSoftwareupdatesPatchEncryptionThreatActorSpearphishingExploitBreachWormVirusAPT(AdvancedPersistentThreat)Personallyidentifiableinformation(PII)BackupsReusingpasswordsCompromiseIntrusionTrojanPenetrationTestingCyberHygieneDarkwebAwarenessHoneypotSecurityPolicyHashingBotnetComplianceInsiderThreat

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Endpoint
  2. Phishing
  3. Backdoor
  4. Malware
  5. IPS (Intrusion Prevention System)
  6. Vulnerability
  7. Multi-factor authentication (MFA)
  8. Social Engineering
  9. Incident Response
  10. Screen lock policy
  11. Risk Assessment
  12. Threat
  13. Training
  14. Ransomware
  15. Zero-day
  16. Threat Intelligence
  17. Whale phishing
  18. Sandbox
  19. Data Loss Prevention (DLP)
  20. Digital Certificate
  21. Cyberattack
  22. Spoofing
  23. IDS (Intrusion Detection System)
  24. Scareware
  25. Software updates
  26. Patch
  27. Encryption
  28. Threat Actor
  29. Spear phishing
  30. Exploit
  31. Breach
  32. Worm
  33. Virus
  34. APT (Advanced Persistent Threat)
  35. Personally identifiable information (PII)
  36. Backups
  37. Reusing passwords
  38. Compromise
  39. Intrusion
  40. Trojan
  41. Penetration Testing
  42. Cyber Hygiene
  43. Dark web
  44. Awareness
  45. Honeypot
  46. Security Policy
  47. Hashing
  48. Botnet
  49. Compliance
  50. Insider Threat