TrainingScarewarePersonallyidentifiableinformation(PII)Zero-dayScreenlockpolicyExploitData LossPrevention(DLP)BreachWormHashingPhishingDarkwebAwarenessThreatIntelligenceVulnerabilityPatchBotnetTrojanCompromiseWhalephishingMalwareSpoofingBackupsReusingpasswordsMulti-factorauthentication(MFA)BackdoorEndpointAPT(AdvancedPersistentThreat)SoftwareupdatesDigitalCertificateSocialEngineeringIncidentResponsePenetrationTestingRiskAssessmentIntrusionCyberHygieneCyberattackEncryptionSpearphishingInsiderThreatThreatActorVirusIDS(IntrusionDetectionSystem)HoneypotThreatComplianceSecurityPolicyIPS(IntrusionPreventionSystem)SandboxRansomwareTrainingScarewarePersonallyidentifiableinformation(PII)Zero-dayScreenlockpolicyExploitData LossPrevention(DLP)BreachWormHashingPhishingDarkwebAwarenessThreatIntelligenceVulnerabilityPatchBotnetTrojanCompromiseWhalephishingMalwareSpoofingBackupsReusingpasswordsMulti-factorauthentication(MFA)BackdoorEndpointAPT(AdvancedPersistentThreat)SoftwareupdatesDigitalCertificateSocialEngineeringIncidentResponsePenetrationTestingRiskAssessmentIntrusionCyberHygieneCyberattackEncryptionSpearphishingInsiderThreatThreatActorVirusIDS(IntrusionDetectionSystem)HoneypotThreatComplianceSecurityPolicyIPS(IntrusionPreventionSystem)SandboxRansomware

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Training
  2. Scareware
  3. Personally identifiable information (PII)
  4. Zero-day
  5. Screen lock policy
  6. Exploit
  7. Data Loss Prevention (DLP)
  8. Breach
  9. Worm
  10. Hashing
  11. Phishing
  12. Dark web
  13. Awareness
  14. Threat Intelligence
  15. Vulnerability
  16. Patch
  17. Botnet
  18. Trojan
  19. Compromise
  20. Whale phishing
  21. Malware
  22. Spoofing
  23. Backups
  24. Reusing passwords
  25. Multi-factor authentication (MFA)
  26. Backdoor
  27. Endpoint
  28. APT (Advanced Persistent Threat)
  29. Software updates
  30. Digital Certificate
  31. Social Engineering
  32. Incident Response
  33. Penetration Testing
  34. Risk Assessment
  35. Intrusion
  36. Cyber Hygiene
  37. Cyberattack
  38. Encryption
  39. Spear phishing
  40. Insider Threat
  41. Threat Actor
  42. Virus
  43. IDS (Intrusion Detection System)
  44. Honeypot
  45. Threat
  46. Compliance
  47. Security Policy
  48. IPS (Intrusion Prevention System)
  49. Sandbox
  50. Ransomware