CyberattackBotnetVPNThreatIntelligenceNext-GenBigDataRansomwareDarkWebZeroTrustCyberEspionagePhishingMFAEnd-to-EndEncryptionDDoSAttackAPTEndpointSecurityIoTSecurityAI-DrivenSecurityVulnerabilityCyberResilienceCloudSecurityMachineLearningAIChatbotArtificialInteligenceHackerIdentity andAccessManagementSOCEncryptionMachineLearningCyberattackBotnetVPNThreatIntelligenceNext-GenBigDataRansomwareDarkWebZeroTrustCyberEspionagePhishingMFAEnd-to-EndEncryptionDDoSAttackAPTEndpointSecurityIoTSecurityAI-DrivenSecurityVulnerabilityCyberResilienceCloudSecurityMachineLearningAIChatbotArtificialInteligenceHackerIdentity andAccessManagementSOCEncryptionMachineLearning

Cybersecurity Buzzword Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Cyberattack
  2. Botnet
  3. VPN
  4. Threat Intelligence
  5. Next-Gen
  6. Big Data
  7. Ransomware
  8. Dark Web
  9. Zero Trust
  10. Cyber Espionage
  11. Phishing
  12. MFA
  13. End-to-End Encryption
  14. DDoS Attack
  15. APT
  16. Endpoint Security
  17. IoT Security
  18. AI-Driven Security
  19. Vulnerability
  20. Cyber Resilience
  21. Cloud Security
  22. Machine Learning
  23. AI Chatbot
  24. Artificial Inteligence
  25. Hacker
  26. Identity and Access Management
  27. SOC
  28. Encryption
  29. Machine Learning