ThreatThreatIntelligenceSpearphishingSpoofingIncidentResponseCompromiseIntrusionRiskAssessmentCyberattackPatchDarkwebExploitReusingpasswordsEncryptionIDS(IntrusionDetectionSystem)HashingSecurityPolicySandboxWormWhalephishingMulti-factorauthentication(MFA)Personallyidentifiableinformation(PII)TrojanZero-dayThreatActorAwarenessDigitalCertificateSocialEngineeringBreachTrainingScreenlockpolicyHoneypotPenetrationTestingVulnerabilityInsiderThreatCompliancePhishingCyberHygieneBackdoorMalwareEndpointSoftwareupdatesScarewareBackupsRansomwareIPS(IntrusionPreventionSystem)Data LossPrevention(DLP)APT(AdvancedPersistentThreat)VirusBotnetThreatThreatIntelligenceSpearphishingSpoofingIncidentResponseCompromiseIntrusionRiskAssessmentCyberattackPatchDarkwebExploitReusingpasswordsEncryptionIDS(IntrusionDetectionSystem)HashingSecurityPolicySandboxWormWhalephishingMulti-factorauthentication(MFA)Personallyidentifiableinformation(PII)TrojanZero-dayThreatActorAwarenessDigitalCertificateSocialEngineeringBreachTrainingScreenlockpolicyHoneypotPenetrationTestingVulnerabilityInsiderThreatCompliancePhishingCyberHygieneBackdoorMalwareEndpointSoftwareupdatesScarewareBackupsRansomwareIPS(IntrusionPreventionSystem)Data LossPrevention(DLP)APT(AdvancedPersistentThreat)VirusBotnet

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Threat
  2. Threat Intelligence
  3. Spear phishing
  4. Spoofing
  5. Incident Response
  6. Compromise
  7. Intrusion
  8. Risk Assessment
  9. Cyberattack
  10. Patch
  11. Dark web
  12. Exploit
  13. Reusing passwords
  14. Encryption
  15. IDS (Intrusion Detection System)
  16. Hashing
  17. Security Policy
  18. Sandbox
  19. Worm
  20. Whale phishing
  21. Multi-factor authentication (MFA)
  22. Personally identifiable information (PII)
  23. Trojan
  24. Zero-day
  25. Threat Actor
  26. Awareness
  27. Digital Certificate
  28. Social Engineering
  29. Breach
  30. Training
  31. Screen lock policy
  32. Honeypot
  33. Penetration Testing
  34. Vulnerability
  35. Insider Threat
  36. Compliance
  37. Phishing
  38. Cyber Hygiene
  39. Backdoor
  40. Malware
  41. Endpoint
  42. Software updates
  43. Scareware
  44. Backups
  45. Ransomware
  46. IPS (Intrusion Prevention System)
  47. Data Loss Prevention (DLP)
  48. APT (Advanced Persistent Threat)
  49. Virus
  50. Botnet