APT(AdvancedPersistentThreat)DarkwebThreatActorSpoofingIDS(IntrusionDetectionSystem)SandboxPhishingDigitalCertificateTrojanBotnetData LossPrevention(DLP)InsiderThreatTrainingExploitSpearphishingThreatIntelligenceIPS(IntrusionPreventionSystem)BackdoorRiskAssessmentHashingCyberattackThreatVirusEncryptionCompliancePatchCyberHygienePersonallyidentifiableinformation(PII)ReusingpasswordsMalwareIntrusionSocialEngineeringPenetrationTestingWormBackupsSecurityPolicySoftwareupdatesRansomwareVulnerabilityMulti-factorauthentication(MFA)CompromiseBreachWhalephishingAwarenessScarewareIncidentResponseZero-dayEndpointScreenlockpolicyHoneypotAPT(AdvancedPersistentThreat)DarkwebThreatActorSpoofingIDS(IntrusionDetectionSystem)SandboxPhishingDigitalCertificateTrojanBotnetData LossPrevention(DLP)InsiderThreatTrainingExploitSpearphishingThreatIntelligenceIPS(IntrusionPreventionSystem)BackdoorRiskAssessmentHashingCyberattackThreatVirusEncryptionCompliancePatchCyberHygienePersonallyidentifiableinformation(PII)ReusingpasswordsMalwareIntrusionSocialEngineeringPenetrationTestingWormBackupsSecurityPolicySoftwareupdatesRansomwareVulnerabilityMulti-factorauthentication(MFA)CompromiseBreachWhalephishingAwarenessScarewareIncidentResponseZero-dayEndpointScreenlockpolicyHoneypot

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. APT (Advanced Persistent Threat)
  2. Dark web
  3. Threat Actor
  4. Spoofing
  5. IDS (Intrusion Detection System)
  6. Sandbox
  7. Phishing
  8. Digital Certificate
  9. Trojan
  10. Botnet
  11. Data Loss Prevention (DLP)
  12. Insider Threat
  13. Training
  14. Exploit
  15. Spear phishing
  16. Threat Intelligence
  17. IPS (Intrusion Prevention System)
  18. Backdoor
  19. Risk Assessment
  20. Hashing
  21. Cyberattack
  22. Threat
  23. Virus
  24. Encryption
  25. Compliance
  26. Patch
  27. Cyber Hygiene
  28. Personally identifiable information (PII)
  29. Reusing passwords
  30. Malware
  31. Intrusion
  32. Social Engineering
  33. Penetration Testing
  34. Worm
  35. Backups
  36. Security Policy
  37. Software updates
  38. Ransomware
  39. Vulnerability
  40. Multi-factor authentication (MFA)
  41. Compromise
  42. Breach
  43. Whale phishing
  44. Awareness
  45. Scareware
  46. Incident Response
  47. Zero-day
  48. Endpoint
  49. Screen lock policy
  50. Honeypot