FIREWALLCLOUD-BASEDIOTMETADATASPOOFINGSOCVULNERABILITYBRUTEFORCEATTACKEPPHEADERSSOCIALENGINEERINGDMZRANSOMWAREBLACKHATHONEYPOTAIPUA/PUPROOTKITANOMALYIOTKEYLOGGERUBAZERO-DAYGRAYHATPENTESTVPNENCRYPTIONDOMAINEXPLOITPATCHBLUETEAMEDRREDTEAMPHISHATTACKSURFACEBOTNETPASSWORDPCIINTEGRITYSOARON-PREMMACHINELEARNINGWHITEHATBREACHDDoSC2CPURPLETEAMWORMTHREATHUNTINGCONFIDENTIALITYAPTAVAILABILITYBYOD2FAKILLCHAINZOMBIETHREATINTELLIGENCENOCSIEMSPEARPHISHFIREWALLCLOUD-BASEDIOTMETADATASPOOFINGSOCVULNERABILITYBRUTEFORCEATTACKEPPHEADERSSOCIALENGINEERINGDMZRANSOMWAREBLACKHATHONEYPOTAIPUA/PUPROOTKITANOMALYIOTKEYLOGGERUBAZERO-DAYGRAYHATPENTESTVPNENCRYPTIONDOMAINEXPLOITPATCHBLUETEAMEDRREDTEAMPHISHATTACKSURFACEBOTNETPASSWORDPCIINTEGRITYSOARON-PREMMACHINELEARNINGWHITEHATBREACHDDoSC2CPURPLETEAMWORMTHREATHUNTINGCONFIDENTIALITYAPTAVAILABILITYBYOD2FAKILLCHAINZOMBIETHREATINTELLIGENCENOCSIEMSPEARPHISH

InfoSec Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. FIREWALL
  2. CLOUD-BASED
  3. IOT
  4. METADATA
  5. SPOOFING
  6. SOC
  7. VULNERABILITY
  8. BRUTE FORCE ATTACK
  9. EPP
  10. HEADERS
  11. SOCIAL ENGINEERING
  12. DMZ
  13. RANSOMWARE
  14. BLACKHAT
  15. HONEYPOT
  16. AI
  17. PUA/PUP
  18. ROOTKIT
  19. ANOMALY
  20. IOT
  21. KEYLOGGER
  22. UBA
  23. ZERO-DAY
  24. GRAYHAT
  25. PENTEST
  26. VPN
  27. ENCRYPTION
  28. DOMAIN
  29. EXPLOIT
  30. PATCH
  31. BLUE TEAM
  32. EDR
  33. RED TEAM
  34. PHISH
  35. ATTACK SURFACE
  36. BOTNET
  37. PASSWORD
  38. PCI
  39. INTEGRITY
  40. SOAR
  41. ON-PREM
  42. MACHINE LEARNING
  43. WHITEHAT
  44. BREACH
  45. DDoS
  46. C2C
  47. PURPLE TEAM
  48. WORM
  49. THREAT HUNTING
  50. CONFIDENTIALITY
  51. APT
  52. AVAILABILITY
  53. BYOD
  54. 2FA
  55. KILL CHAIN
  56. ZOMBIE
  57. THREAT INTELLIGENCE
  58. NOC
  59. SIEM
  60. SPEARPHISH