PhishingRansomwareCyberResilienceVulnerabilityMFAMachineLearningBotnetAIChatbotCyberattackIoTSecurityArtificialInteligenceCloudSecurityZeroTrustBigDataSOCMachineLearningAI-DrivenSecurityEncryptionEnd-to-EndEncryptionAPTVPNEndpointSecurityCyberEspionageIdentity andAccessManagementDDoSAttackThreatIntelligenceHackerNext-GenDarkWebPhishingRansomwareCyberResilienceVulnerabilityMFAMachineLearningBotnetAIChatbotCyberattackIoTSecurityArtificialInteligenceCloudSecurityZeroTrustBigDataSOCMachineLearningAI-DrivenSecurityEncryptionEnd-to-EndEncryptionAPTVPNEndpointSecurityCyberEspionageIdentity andAccessManagementDDoSAttackThreatIntelligenceHackerNext-GenDarkWeb

Cybersecurity Buzzword Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Phishing
  2. Ransomware
  3. Cyber Resilience
  4. Vulnerability
  5. MFA
  6. Machine Learning
  7. Botnet
  8. AI Chatbot
  9. Cyberattack
  10. IoT Security
  11. Artificial Inteligence
  12. Cloud Security
  13. Zero Trust
  14. Big Data
  15. SOC
  16. Machine Learning
  17. AI-Driven Security
  18. Encryption
  19. End-to-End Encryption
  20. APT
  21. VPN
  22. Endpoint Security
  23. Cyber Espionage
  24. Identity and Access Management
  25. DDoS Attack
  26. Threat Intelligence
  27. Hacker
  28. Next-Gen
  29. Dark Web