SecurityPolicyAPT(AdvancedPersistentThreat)TrojanThreatIntrusionScreenlockpolicyEndpointPersonallyidentifiableinformation(PII)SpoofingThreatIntelligenceInsiderThreatPhishingCyberHygieneData LossPrevention(DLP)VirusWormHoneypotVulnerabilityHashingReusingpasswordsSpearphishingRansomwareMulti-factorauthentication(MFA)BackdoorDigitalCertificateIncidentResponseCompromiseZero-dayMalwarePenetrationTestingIDS(IntrusionDetectionSystem)AwarenessBotnetThreatActorBreachRiskAssessmentScarewareExploitIPS(IntrusionPreventionSystem)CyberattackPatchTrainingSocialEngineeringComplianceSandboxDarkwebWhalephishingSoftwareupdatesBackupsEncryptionSecurityPolicyAPT(AdvancedPersistentThreat)TrojanThreatIntrusionScreenlockpolicyEndpointPersonallyidentifiableinformation(PII)SpoofingThreatIntelligenceInsiderThreatPhishingCyberHygieneData LossPrevention(DLP)VirusWormHoneypotVulnerabilityHashingReusingpasswordsSpearphishingRansomwareMulti-factorauthentication(MFA)BackdoorDigitalCertificateIncidentResponseCompromiseZero-dayMalwarePenetrationTestingIDS(IntrusionDetectionSystem)AwarenessBotnetThreatActorBreachRiskAssessmentScarewareExploitIPS(IntrusionPreventionSystem)CyberattackPatchTrainingSocialEngineeringComplianceSandboxDarkwebWhalephishingSoftwareupdatesBackupsEncryption

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Security Policy
  2. APT (Advanced Persistent Threat)
  3. Trojan
  4. Threat
  5. Intrusion
  6. Screen lock policy
  7. Endpoint
  8. Personally identifiable information (PII)
  9. Spoofing
  10. Threat Intelligence
  11. Insider Threat
  12. Phishing
  13. Cyber Hygiene
  14. Data Loss Prevention (DLP)
  15. Virus
  16. Worm
  17. Honeypot
  18. Vulnerability
  19. Hashing
  20. Reusing passwords
  21. Spear phishing
  22. Ransomware
  23. Multi-factor authentication (MFA)
  24. Backdoor
  25. Digital Certificate
  26. Incident Response
  27. Compromise
  28. Zero-day
  29. Malware
  30. Penetration Testing
  31. IDS (Intrusion Detection System)
  32. Awareness
  33. Botnet
  34. Threat Actor
  35. Breach
  36. Risk Assessment
  37. Scareware
  38. Exploit
  39. IPS (Intrusion Prevention System)
  40. Cyberattack
  41. Patch
  42. Training
  43. Social Engineering
  44. Compliance
  45. Sandbox
  46. Dark web
  47. Whale phishing
  48. Software updates
  49. Backups
  50. Encryption