Has a coding- themed wardrobe Enjoys hiking Loves debugging more than coding Uses a VPN Uses a password manager religiously Has run a marathon Enjoys coding Is a morning person Uses a webcam cover Has traveled to more than 5 countries Educates others on security Is a fitness enthusiast Has a secret stash of snacks Wears a hoodie while coding Has a cybersecurity- themed wardrobe Plays a musical instrument Has a favorite cybersecurity catchphrase Loves reading books Reads cybersecurity blogs Participates in CTFs Uses multi- factor authentication Uses secure coding practices Has multiple certifications Loves coffee Has a coding- themed wardrobe Enjoys hiking Loves debugging more than coding Uses a VPN Uses a password manager religiously Has run a marathon Enjoys coding Is a morning person Uses a webcam cover Has traveled to more than 5 countries Educates others on security Is a fitness enthusiast Has a secret stash of snacks Wears a hoodie while coding Has a cybersecurity- themed wardrobe Plays a musical instrument Has a favorite cybersecurity catchphrase Loves reading books Reads cybersecurity blogs Participates in CTFs Uses multi- factor authentication Uses secure coding practices Has multiple certifications Loves coffee
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Has a coding-themed wardrobe
Enjoys hiking
Loves debugging more than coding
Uses a VPN
Uses a password manager religiously
Has run a marathon
Enjoys coding
Is a morning person
Uses a webcam cover
Has traveled to more than 5 countries
Educates others on security
Is a fitness enthusiast
Has a secret stash of snacks
Wears a hoodie while coding
Has a cybersecurity-themed wardrobe
Plays a musical instrument
Has a favorite cybersecurity catchphrase
Loves reading books
Reads cybersecurity blogs
Participates in CTFs
Uses multi-factor authentication
Uses secure coding practices
Has multiple certifications
Loves coffee