TrojanCyberHygieneComplianceRiskAssessmentSpoofingCyberattackWormThreatEncryptionThreatIntelligenceVirusBackupsRansomwareReusingpasswordsPatchSocialEngineeringMalwareVulnerabilityDigitalCertificateInsiderThreatBreachHashingExploitDarkwebData LossPrevention(DLP)TrainingIncidentResponseSpearphishingScreenlockpolicyIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)EndpointSandboxZero-dayPersonallyidentifiableinformation(PII)SoftwareupdatesBotnetAPT(AdvancedPersistentThreat)BackdoorIDS(IntrusionDetectionSystem)HoneypotScarewareSecurityPolicyThreatActorWhalephishingAwarenessIntrusionPhishingCompromisePenetrationTestingTrojanCyberHygieneComplianceRiskAssessmentSpoofingCyberattackWormThreatEncryptionThreatIntelligenceVirusBackupsRansomwareReusingpasswordsPatchSocialEngineeringMalwareVulnerabilityDigitalCertificateInsiderThreatBreachHashingExploitDarkwebData LossPrevention(DLP)TrainingIncidentResponseSpearphishingScreenlockpolicyIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)EndpointSandboxZero-dayPersonallyidentifiableinformation(PII)SoftwareupdatesBotnetAPT(AdvancedPersistentThreat)BackdoorIDS(IntrusionDetectionSystem)HoneypotScarewareSecurityPolicyThreatActorWhalephishingAwarenessIntrusionPhishingCompromisePenetrationTesting

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Trojan
  2. Cyber Hygiene
  3. Compliance
  4. Risk Assessment
  5. Spoofing
  6. Cyberattack
  7. Worm
  8. Threat
  9. Encryption
  10. Threat Intelligence
  11. Virus
  12. Backups
  13. Ransomware
  14. Reusing passwords
  15. Patch
  16. Social Engineering
  17. Malware
  18. Vulnerability
  19. Digital Certificate
  20. Insider Threat
  21. Breach
  22. Hashing
  23. Exploit
  24. Dark web
  25. Data Loss Prevention (DLP)
  26. Training
  27. Incident Response
  28. Spear phishing
  29. Screen lock policy
  30. IPS (Intrusion Prevention System)
  31. Multi-factor authentication (MFA)
  32. Endpoint
  33. Sandbox
  34. Zero-day
  35. Personally identifiable information (PII)
  36. Software updates
  37. Botnet
  38. APT (Advanced Persistent Threat)
  39. Backdoor
  40. IDS (Intrusion Detection System)
  41. Honeypot
  42. Scareware
  43. Security Policy
  44. Threat Actor
  45. Whale phishing
  46. Awareness
  47. Intrusion
  48. Phishing
  49. Compromise
  50. Penetration Testing