RiskAssessmentScarewareBackupsSpoofingWormDigitalCertificateZero-dayCyberattackHoneypotSecurityPolicyCompromisePatchTrainingTrojanWhalephishingThreatIntrusionVulnerabilityBotnetSandboxCyberHygieneExploitIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)DarkwebSpearphishingThreatActorThreatIntelligenceEndpointVirusComplianceIDS(IntrusionDetectionSystem)APT(AdvancedPersistentThreat)PhishingBreachReusingpasswordsMalwarePersonallyidentifiableinformation(PII)PenetrationTestingScreenlockpolicyIncidentResponseSoftwareupdatesEncryptionHashingSocialEngineeringData LossPrevention(DLP)AwarenessInsiderThreatRansomwareBackdoorRiskAssessmentScarewareBackupsSpoofingWormDigitalCertificateZero-dayCyberattackHoneypotSecurityPolicyCompromisePatchTrainingTrojanWhalephishingThreatIntrusionVulnerabilityBotnetSandboxCyberHygieneExploitIPS(IntrusionPreventionSystem)Multi-factorauthentication(MFA)DarkwebSpearphishingThreatActorThreatIntelligenceEndpointVirusComplianceIDS(IntrusionDetectionSystem)APT(AdvancedPersistentThreat)PhishingBreachReusingpasswordsMalwarePersonallyidentifiableinformation(PII)PenetrationTestingScreenlockpolicyIncidentResponseSoftwareupdatesEncryptionHashingSocialEngineeringData LossPrevention(DLP)AwarenessInsiderThreatRansomwareBackdoor

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Risk Assessment
  2. Scareware
  3. Backups
  4. Spoofing
  5. Worm
  6. Digital Certificate
  7. Zero-day
  8. Cyberattack
  9. Honeypot
  10. Security Policy
  11. Compromise
  12. Patch
  13. Training
  14. Trojan
  15. Whale phishing
  16. Threat
  17. Intrusion
  18. Vulnerability
  19. Botnet
  20. Sandbox
  21. Cyber Hygiene
  22. Exploit
  23. IPS (Intrusion Prevention System)
  24. Multi-factor authentication (MFA)
  25. Dark web
  26. Spear phishing
  27. Threat Actor
  28. Threat Intelligence
  29. Endpoint
  30. Virus
  31. Compliance
  32. IDS (Intrusion Detection System)
  33. APT (Advanced Persistent Threat)
  34. Phishing
  35. Breach
  36. Reusing passwords
  37. Malware
  38. Personally identifiable information (PII)
  39. Penetration Testing
  40. Screen lock policy
  41. Incident Response
  42. Software updates
  43. Encryption
  44. Hashing
  45. Social Engineering
  46. Data Loss Prevention (DLP)
  47. Awareness
  48. Insider Threat
  49. Ransomware
  50. Backdoor