InsiderThreatTrainingWormScreenlockpolicyDarkwebIncidentResponseBotnetVulnerabilityReusingpasswordsScarewareAwarenessSocialEngineeringZero-dayHashingHoneypotSpearphishingPhishingBackupsPersonallyidentifiableinformation(PII)IPS(IntrusionPreventionSystem)RansomwareSoftwareupdatesBreachPatchThreatThreatIntelligenceTrojanEncryptionData LossPrevention(DLP)ComplianceCyberattackSandboxPenetrationTestingIDS(IntrusionDetectionSystem)SpoofingAPT(AdvancedPersistentThreat)DigitalCertificateWhalephishingMalwareCompromiseThreatActorBackdoorSecurityPolicyRiskAssessmentExploitIntrusionCyberHygieneVirusMulti-factorauthentication(MFA)EndpointInsiderThreatTrainingWormScreenlockpolicyDarkwebIncidentResponseBotnetVulnerabilityReusingpasswordsScarewareAwarenessSocialEngineeringZero-dayHashingHoneypotSpearphishingPhishingBackupsPersonallyidentifiableinformation(PII)IPS(IntrusionPreventionSystem)RansomwareSoftwareupdatesBreachPatchThreatThreatIntelligenceTrojanEncryptionData LossPrevention(DLP)ComplianceCyberattackSandboxPenetrationTestingIDS(IntrusionDetectionSystem)SpoofingAPT(AdvancedPersistentThreat)DigitalCertificateWhalephishingMalwareCompromiseThreatActorBackdoorSecurityPolicyRiskAssessmentExploitIntrusionCyberHygieneVirusMulti-factorauthentication(MFA)Endpoint

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Insider Threat
  2. Training
  3. Worm
  4. Screen lock policy
  5. Dark web
  6. Incident Response
  7. Botnet
  8. Vulnerability
  9. Reusing passwords
  10. Scareware
  11. Awareness
  12. Social Engineering
  13. Zero-day
  14. Hashing
  15. Honeypot
  16. Spear phishing
  17. Phishing
  18. Backups
  19. Personally identifiable information (PII)
  20. IPS (Intrusion Prevention System)
  21. Ransomware
  22. Software updates
  23. Breach
  24. Patch
  25. Threat
  26. Threat Intelligence
  27. Trojan
  28. Encryption
  29. Data Loss Prevention (DLP)
  30. Compliance
  31. Cyberattack
  32. Sandbox
  33. Penetration Testing
  34. IDS (Intrusion Detection System)
  35. Spoofing
  36. APT (Advanced Persistent Threat)
  37. Digital Certificate
  38. Whale phishing
  39. Malware
  40. Compromise
  41. Threat Actor
  42. Backdoor
  43. Security Policy
  44. Risk Assessment
  45. Exploit
  46. Intrusion
  47. Cyber Hygiene
  48. Virus
  49. Multi-factor authentication (MFA)
  50. Endpoint