TrainingHoneypotBotnetPatchReusingpasswordsPenetrationTestingData LossPrevention(DLP)Multi-factorauthentication(MFA)BackupsIPS(IntrusionPreventionSystem)BackdoorWormSandboxBreachAwarenessPhishingScreenlockpolicyThreatExploitSoftwareupdatesInsiderThreatMalwareSecurityPolicyThreatIntelligenceIDS(IntrusionDetectionSystem)CyberattackWhalephishingThreatActorDigitalCertificateRansomwareIntrusionHashingSpoofingScarewareAPT(AdvancedPersistentThreat)SpearphishingCyberHygieneRiskAssessmentCompromiseVulnerabilitySocialEngineeringComplianceIncidentResponseDarkwebEndpointTrojanZero-dayPersonallyidentifiableinformation(PII)EncryptionVirusTrainingHoneypotBotnetPatchReusingpasswordsPenetrationTestingData LossPrevention(DLP)Multi-factorauthentication(MFA)BackupsIPS(IntrusionPreventionSystem)BackdoorWormSandboxBreachAwarenessPhishingScreenlockpolicyThreatExploitSoftwareupdatesInsiderThreatMalwareSecurityPolicyThreatIntelligenceIDS(IntrusionDetectionSystem)CyberattackWhalephishingThreatActorDigitalCertificateRansomwareIntrusionHashingSpoofingScarewareAPT(AdvancedPersistentThreat)SpearphishingCyberHygieneRiskAssessmentCompromiseVulnerabilitySocialEngineeringComplianceIncidentResponseDarkwebEndpointTrojanZero-dayPersonallyidentifiableinformation(PII)EncryptionVirus

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Training
  2. Honeypot
  3. Botnet
  4. Patch
  5. Reusing passwords
  6. Penetration Testing
  7. Data Loss Prevention (DLP)
  8. Multi-factor authentication (MFA)
  9. Backups
  10. IPS (Intrusion Prevention System)
  11. Backdoor
  12. Worm
  13. Sandbox
  14. Breach
  15. Awareness
  16. Phishing
  17. Screen lock policy
  18. Threat
  19. Exploit
  20. Software updates
  21. Insider Threat
  22. Malware
  23. Security Policy
  24. Threat Intelligence
  25. IDS (Intrusion Detection System)
  26. Cyberattack
  27. Whale phishing
  28. Threat Actor
  29. Digital Certificate
  30. Ransomware
  31. Intrusion
  32. Hashing
  33. Spoofing
  34. Scareware
  35. APT (Advanced Persistent Threat)
  36. Spear phishing
  37. Cyber Hygiene
  38. Risk Assessment
  39. Compromise
  40. Vulnerability
  41. Social Engineering
  42. Compliance
  43. Incident Response
  44. Dark web
  45. Endpoint
  46. Trojan
  47. Zero-day
  48. Personally identifiable information (PII)
  49. Encryption
  50. Virus