IncidentResponseSocialEngineeringSecurityPolicyThreatReusingpasswordsIPS(IntrusionPreventionSystem)ThreatIntelligenceWormDarkwebCyberHygienePhishingScreenlockpolicyBotnetEncryptionPenetrationTestingAPT(AdvancedPersistentThreat)TrojanCompromiseExploitHashingSpearphishingSandboxComplianceBreachThreatActorRiskAssessmentWhalephishingAwarenessScarewareMalwareMulti-factorauthentication(MFA)Zero-dayBackdoorInsiderThreatHoneypotCyberattackEndpointDigitalCertificateIDS(IntrusionDetectionSystem)SoftwareupdatesVulnerabilityPatchVirusIntrusionRansomwarePersonallyidentifiableinformation(PII)BackupsSpoofingData LossPrevention(DLP)TrainingIncidentResponseSocialEngineeringSecurityPolicyThreatReusingpasswordsIPS(IntrusionPreventionSystem)ThreatIntelligenceWormDarkwebCyberHygienePhishingScreenlockpolicyBotnetEncryptionPenetrationTestingAPT(AdvancedPersistentThreat)TrojanCompromiseExploitHashingSpearphishingSandboxComplianceBreachThreatActorRiskAssessmentWhalephishingAwarenessScarewareMalwareMulti-factorauthentication(MFA)Zero-dayBackdoorInsiderThreatHoneypotCyberattackEndpointDigitalCertificateIDS(IntrusionDetectionSystem)SoftwareupdatesVulnerabilityPatchVirusIntrusionRansomwarePersonallyidentifiableinformation(PII)BackupsSpoofingData LossPrevention(DLP)Training

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Incident Response
  2. Social Engineering
  3. Security Policy
  4. Threat
  5. Reusing passwords
  6. IPS (Intrusion Prevention System)
  7. Threat Intelligence
  8. Worm
  9. Dark web
  10. Cyber Hygiene
  11. Phishing
  12. Screen lock policy
  13. Botnet
  14. Encryption
  15. Penetration Testing
  16. APT (Advanced Persistent Threat)
  17. Trojan
  18. Compromise
  19. Exploit
  20. Hashing
  21. Spear phishing
  22. Sandbox
  23. Compliance
  24. Breach
  25. Threat Actor
  26. Risk Assessment
  27. Whale phishing
  28. Awareness
  29. Scareware
  30. Malware
  31. Multi-factor authentication (MFA)
  32. Zero-day
  33. Backdoor
  34. Insider Threat
  35. Honeypot
  36. Cyberattack
  37. Endpoint
  38. Digital Certificate
  39. IDS (Intrusion Detection System)
  40. Software updates
  41. Vulnerability
  42. Patch
  43. Virus
  44. Intrusion
  45. Ransomware
  46. Personally identifiable information (PII)
  47. Backups
  48. Spoofing
  49. Data Loss Prevention (DLP)
  50. Training