ComplianceAPT(AdvancedPersistentThreat)ThreatIntelligenceEncryptionThreatActorAwarenessSpoofingPersonallyidentifiableinformation(PII)MalwareExploitTrainingSecurityPolicyScarewareDarkwebHoneypotIncidentResponseVulnerabilityHashingWhalephishingBreachSandboxTrojanSpearphishingRiskAssessmentDigitalCertificateBotnetSoftwareupdatesPenetrationTestingPatchMulti-factorauthentication(MFA)IntrusionCompromiseEndpointData LossPrevention(DLP)BackdoorVirusWormIPS(IntrusionPreventionSystem)ReusingpasswordsCyberHygieneThreatBackupsRansomwareZero-dayScreenlockpolicySocialEngineeringCyberattackIDS(IntrusionDetectionSystem)InsiderThreatPhishingComplianceAPT(AdvancedPersistentThreat)ThreatIntelligenceEncryptionThreatActorAwarenessSpoofingPersonallyidentifiableinformation(PII)MalwareExploitTrainingSecurityPolicyScarewareDarkwebHoneypotIncidentResponseVulnerabilityHashingWhalephishingBreachSandboxTrojanSpearphishingRiskAssessmentDigitalCertificateBotnetSoftwareupdatesPenetrationTestingPatchMulti-factorauthentication(MFA)IntrusionCompromiseEndpointData LossPrevention(DLP)BackdoorVirusWormIPS(IntrusionPreventionSystem)ReusingpasswordsCyberHygieneThreatBackupsRansomwareZero-dayScreenlockpolicySocialEngineeringCyberattackIDS(IntrusionDetectionSystem)InsiderThreatPhishing

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Compliance
  2. APT (Advanced Persistent Threat)
  3. Threat Intelligence
  4. Encryption
  5. Threat Actor
  6. Awareness
  7. Spoofing
  8. Personally identifiable information (PII)
  9. Malware
  10. Exploit
  11. Training
  12. Security Policy
  13. Scareware
  14. Dark web
  15. Honeypot
  16. Incident Response
  17. Vulnerability
  18. Hashing
  19. Whale phishing
  20. Breach
  21. Sandbox
  22. Trojan
  23. Spear phishing
  24. Risk Assessment
  25. Digital Certificate
  26. Botnet
  27. Software updates
  28. Penetration Testing
  29. Patch
  30. Multi-factor authentication (MFA)
  31. Intrusion
  32. Compromise
  33. Endpoint
  34. Data Loss Prevention (DLP)
  35. Backdoor
  36. Virus
  37. Worm
  38. IPS (Intrusion Prevention System)
  39. Reusing passwords
  40. Cyber Hygiene
  41. Threat
  42. Backups
  43. Ransomware
  44. Zero-day
  45. Screen lock policy
  46. Social Engineering
  47. Cyberattack
  48. IDS (Intrusion Detection System)
  49. Insider Threat
  50. Phishing