SpearphishingZero-daySocialEngineeringBackupsInsiderThreatSandboxScarewareData LossPrevention(DLP)Personallyidentifiableinformation(PII)TrainingDigitalCertificateSoftwareupdatesMulti-factorauthentication(MFA)IntrusionRansomwareHashingComplianceEndpointThreatIntelligenceTrojanMalwareBackdoorCyberHygieneVirusSecurityPolicyAPT(AdvancedPersistentThreat)PatchSpoofingIPS(IntrusionPreventionSystem)RiskAssessmentThreatPhishingAwarenessVulnerabilityBotnetIncidentResponseEncryptionReusingpasswordsThreatActorCompromiseExploitScreenlockpolicyHoneypotIDS(IntrusionDetectionSystem)BreachWormPenetrationTestingWhalephishingCyberattackDarkwebSpearphishingZero-daySocialEngineeringBackupsInsiderThreatSandboxScarewareData LossPrevention(DLP)Personallyidentifiableinformation(PII)TrainingDigitalCertificateSoftwareupdatesMulti-factorauthentication(MFA)IntrusionRansomwareHashingComplianceEndpointThreatIntelligenceTrojanMalwareBackdoorCyberHygieneVirusSecurityPolicyAPT(AdvancedPersistentThreat)PatchSpoofingIPS(IntrusionPreventionSystem)RiskAssessmentThreatPhishingAwarenessVulnerabilityBotnetIncidentResponseEncryptionReusingpasswordsThreatActorCompromiseExploitScreenlockpolicyHoneypotIDS(IntrusionDetectionSystem)BreachWormPenetrationTestingWhalephishingCyberattackDarkweb

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Spear phishing
  2. Zero-day
  3. Social Engineering
  4. Backups
  5. Insider Threat
  6. Sandbox
  7. Scareware
  8. Data Loss Prevention (DLP)
  9. Personally identifiable information (PII)
  10. Training
  11. Digital Certificate
  12. Software updates
  13. Multi-factor authentication (MFA)
  14. Intrusion
  15. Ransomware
  16. Hashing
  17. Compliance
  18. Endpoint
  19. Threat Intelligence
  20. Trojan
  21. Malware
  22. Backdoor
  23. Cyber Hygiene
  24. Virus
  25. Security Policy
  26. APT (Advanced Persistent Threat)
  27. Patch
  28. Spoofing
  29. IPS (Intrusion Prevention System)
  30. Risk Assessment
  31. Threat
  32. Phishing
  33. Awareness
  34. Vulnerability
  35. Botnet
  36. Incident Response
  37. Encryption
  38. Reusing passwords
  39. Threat Actor
  40. Compromise
  41. Exploit
  42. Screen lock policy
  43. Honeypot
  44. IDS (Intrusion Detection System)
  45. Breach
  46. Worm
  47. Penetration Testing
  48. Whale phishing
  49. Cyberattack
  50. Dark web