EndpointRansomwareTrojanSpoofingIntrusionData LossPrevention(DLP)BackupsBotnetEncryptionVirusScarewarePhishingMalwareIPS(IntrusionPreventionSystem)ExploitScreenlockpolicyWormDigitalCertificateThreatThreatIntelligenceHashingMulti-factorauthentication(MFA)RiskAssessmentTrainingPersonallyidentifiableinformation(PII)APT(AdvancedPersistentThreat)PatchInsiderThreatZero-dayIDS(IntrusionDetectionSystem)IncidentResponseSocialEngineeringSoftwareupdatesSandboxCyberHygieneCyberattackVulnerabilityBreachSecurityPolicyWhalephishingThreatActorHoneypotDarkwebBackdoorReusingpasswordsAwarenessCompliancePenetrationTestingSpearphishingCompromiseEndpointRansomwareTrojanSpoofingIntrusionData LossPrevention(DLP)BackupsBotnetEncryptionVirusScarewarePhishingMalwareIPS(IntrusionPreventionSystem)ExploitScreenlockpolicyWormDigitalCertificateThreatThreatIntelligenceHashingMulti-factorauthentication(MFA)RiskAssessmentTrainingPersonallyidentifiableinformation(PII)APT(AdvancedPersistentThreat)PatchInsiderThreatZero-dayIDS(IntrusionDetectionSystem)IncidentResponseSocialEngineeringSoftwareupdatesSandboxCyberHygieneCyberattackVulnerabilityBreachSecurityPolicyWhalephishingThreatActorHoneypotDarkwebBackdoorReusingpasswordsAwarenessCompliancePenetrationTestingSpearphishingCompromise

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Endpoint
  2. Ransomware
  3. Trojan
  4. Spoofing
  5. Intrusion
  6. Data Loss Prevention (DLP)
  7. Backups
  8. Botnet
  9. Encryption
  10. Virus
  11. Scareware
  12. Phishing
  13. Malware
  14. IPS (Intrusion Prevention System)
  15. Exploit
  16. Screen lock policy
  17. Worm
  18. Digital Certificate
  19. Threat
  20. Threat Intelligence
  21. Hashing
  22. Multi-factor authentication (MFA)
  23. Risk Assessment
  24. Training
  25. Personally identifiable information (PII)
  26. APT (Advanced Persistent Threat)
  27. Patch
  28. Insider Threat
  29. Zero-day
  30. IDS (Intrusion Detection System)
  31. Incident Response
  32. Social Engineering
  33. Software updates
  34. Sandbox
  35. Cyber Hygiene
  36. Cyberattack
  37. Vulnerability
  38. Breach
  39. Security Policy
  40. Whale phishing
  41. Threat Actor
  42. Honeypot
  43. Dark web
  44. Backdoor
  45. Reusing passwords
  46. Awareness
  47. Compliance
  48. Penetration Testing
  49. Spear phishing
  50. Compromise