HoneypotRiskAssessmentThreatIntelligenceTrainingPersonallyidentifiableinformation(PII)EndpointComplianceThreatActorSandboxPenetrationTestingVirusSpoofingBackupsThreatWhalephishingExploitAPT(AdvancedPersistentThreat)CyberattackBackdoorPhishingDarkwebCyberHygieneTrojanZero-dayDigitalCertificateMulti-factorauthentication(MFA)ScreenlockpolicySecurityPolicyReusingpasswordsEncryptionData LossPrevention(DLP)IPS(IntrusionPreventionSystem)BreachRansomwareIDS(IntrusionDetectionSystem)VulnerabilityIntrusionSpearphishingSoftwareupdatesAwarenessIncidentResponseScarewareWormCompromiseHashingSocialEngineeringBotnetPatchInsiderThreatMalwareHoneypotRiskAssessmentThreatIntelligenceTrainingPersonallyidentifiableinformation(PII)EndpointComplianceThreatActorSandboxPenetrationTestingVirusSpoofingBackupsThreatWhalephishingExploitAPT(AdvancedPersistentThreat)CyberattackBackdoorPhishingDarkwebCyberHygieneTrojanZero-dayDigitalCertificateMulti-factorauthentication(MFA)ScreenlockpolicySecurityPolicyReusingpasswordsEncryptionData LossPrevention(DLP)IPS(IntrusionPreventionSystem)BreachRansomwareIDS(IntrusionDetectionSystem)VulnerabilityIntrusionSpearphishingSoftwareupdatesAwarenessIncidentResponseScarewareWormCompromiseHashingSocialEngineeringBotnetPatchInsiderThreatMalware

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Honeypot
  2. Risk Assessment
  3. Threat Intelligence
  4. Training
  5. Personally identifiable information (PII)
  6. Endpoint
  7. Compliance
  8. Threat Actor
  9. Sandbox
  10. Penetration Testing
  11. Virus
  12. Spoofing
  13. Backups
  14. Threat
  15. Whale phishing
  16. Exploit
  17. APT (Advanced Persistent Threat)
  18. Cyberattack
  19. Backdoor
  20. Phishing
  21. Dark web
  22. Cyber Hygiene
  23. Trojan
  24. Zero-day
  25. Digital Certificate
  26. Multi-factor authentication (MFA)
  27. Screen lock policy
  28. Security Policy
  29. Reusing passwords
  30. Encryption
  31. Data Loss Prevention (DLP)
  32. IPS (Intrusion Prevention System)
  33. Breach
  34. Ransomware
  35. IDS (Intrusion Detection System)
  36. Vulnerability
  37. Intrusion
  38. Spear phishing
  39. Software updates
  40. Awareness
  41. Incident Response
  42. Scareware
  43. Worm
  44. Compromise
  45. Hashing
  46. Social Engineering
  47. Botnet
  48. Patch
  49. Insider Threat
  50. Malware