IPS(IntrusionPreventionSystem)Zero-dayCyberattackScarewareBreachDigitalCertificateExploitCyberHygieneIDS(IntrusionDetectionSystem)Multi-factorauthentication(MFA)BackdoorHashingSpearphishingSecurityPolicyIncidentResponseThreatData LossPrevention(DLP)SocialEngineeringWormBotnetInsiderThreatTrojanEndpointIntrusionThreatActorVulnerabilityScreenlockpolicyCompromiseSandboxBackupsRansomwareEncryptionSpoofingPhishingPatchAPT(AdvancedPersistentThreat)Personallyidentifiableinformation(PII)ThreatIntelligenceVirusAwarenessComplianceWhalephishingSoftwareupdatesRiskAssessmentHoneypotDarkwebTrainingMalwarePenetrationTestingReusingpasswordsIPS(IntrusionPreventionSystem)Zero-dayCyberattackScarewareBreachDigitalCertificateExploitCyberHygieneIDS(IntrusionDetectionSystem)Multi-factorauthentication(MFA)BackdoorHashingSpearphishingSecurityPolicyIncidentResponseThreatData LossPrevention(DLP)SocialEngineeringWormBotnetInsiderThreatTrojanEndpointIntrusionThreatActorVulnerabilityScreenlockpolicyCompromiseSandboxBackupsRansomwareEncryptionSpoofingPhishingPatchAPT(AdvancedPersistentThreat)Personallyidentifiableinformation(PII)ThreatIntelligenceVirusAwarenessComplianceWhalephishingSoftwareupdatesRiskAssessmentHoneypotDarkwebTrainingMalwarePenetrationTestingReusingpasswords

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. IPS (Intrusion Prevention System)
  2. Zero-day
  3. Cyberattack
  4. Scareware
  5. Breach
  6. Digital Certificate
  7. Exploit
  8. Cyber Hygiene
  9. IDS (Intrusion Detection System)
  10. Multi-factor authentication (MFA)
  11. Backdoor
  12. Hashing
  13. Spear phishing
  14. Security Policy
  15. Incident Response
  16. Threat
  17. Data Loss Prevention (DLP)
  18. Social Engineering
  19. Worm
  20. Botnet
  21. Insider Threat
  22. Trojan
  23. Endpoint
  24. Intrusion
  25. Threat Actor
  26. Vulnerability
  27. Screen lock policy
  28. Compromise
  29. Sandbox
  30. Backups
  31. Ransomware
  32. Encryption
  33. Spoofing
  34. Phishing
  35. Patch
  36. APT (Advanced Persistent Threat)
  37. Personally identifiable information (PII)
  38. Threat Intelligence
  39. Virus
  40. Awareness
  41. Compliance
  42. Whale phishing
  43. Software updates
  44. Risk Assessment
  45. Honeypot
  46. Dark web
  47. Training
  48. Malware
  49. Penetration Testing
  50. Reusing passwords