BackupsIntrusionVirusIncidentResponseSpearphishingScarewareTrojanBotnetRiskAssessmentZero-dayIPS(IntrusionPreventionSystem)ExploitPenetrationTestingHoneypotReusingpasswordsCyberHygieneBackdoorThreatInsiderThreatSpoofingIDS(IntrusionDetectionSystem)Data LossPrevention(DLP)Multi-factorauthentication(MFA)Personallyidentifiableinformation(PII)ScreenlockpolicyThreatActorRansomwareDarkwebHashingBreachAwarenessSoftwareupdatesWormCompromiseThreatIntelligenceTrainingCyberattackPhishingVulnerabilityDigitalCertificateAPT(AdvancedPersistentThreat)CompliancePatchEndpointEncryptionSocialEngineeringWhalephishingMalwareSecurityPolicySandboxBackupsIntrusionVirusIncidentResponseSpearphishingScarewareTrojanBotnetRiskAssessmentZero-dayIPS(IntrusionPreventionSystem)ExploitPenetrationTestingHoneypotReusingpasswordsCyberHygieneBackdoorThreatInsiderThreatSpoofingIDS(IntrusionDetectionSystem)Data LossPrevention(DLP)Multi-factorauthentication(MFA)Personallyidentifiableinformation(PII)ScreenlockpolicyThreatActorRansomwareDarkwebHashingBreachAwarenessSoftwareupdatesWormCompromiseThreatIntelligenceTrainingCyberattackPhishingVulnerabilityDigitalCertificateAPT(AdvancedPersistentThreat)CompliancePatchEndpointEncryptionSocialEngineeringWhalephishingMalwareSecurityPolicySandbox

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Backups
  2. Intrusion
  3. Virus
  4. Incident Response
  5. Spear phishing
  6. Scareware
  7. Trojan
  8. Botnet
  9. Risk Assessment
  10. Zero-day
  11. IPS (Intrusion Prevention System)
  12. Exploit
  13. Penetration Testing
  14. Honeypot
  15. Reusing passwords
  16. Cyber Hygiene
  17. Backdoor
  18. Threat
  19. Insider Threat
  20. Spoofing
  21. IDS (Intrusion Detection System)
  22. Data Loss Prevention (DLP)
  23. Multi-factor authentication (MFA)
  24. Personally identifiable information (PII)
  25. Screen lock policy
  26. Threat Actor
  27. Ransomware
  28. Dark web
  29. Hashing
  30. Breach
  31. Awareness
  32. Software updates
  33. Worm
  34. Compromise
  35. Threat Intelligence
  36. Training
  37. Cyberattack
  38. Phishing
  39. Vulnerability
  40. Digital Certificate
  41. APT (Advanced Persistent Threat)
  42. Compliance
  43. Patch
  44. Endpoint
  45. Encryption
  46. Social Engineering
  47. Whale phishing
  48. Malware
  49. Security Policy
  50. Sandbox