APTPASSWORDSOCBLACKHATGRAYHATDOMAINCLOUD-BASEDANOMALYAIRANSOMWAREIOTWHITEHATUBAKILLCHAINC2CMACHINELEARNINGMETADATANOC2FASPOOFINGBOTNETZERO-DAYEPPPENTESTENCRYPTIONFIREWALLON-PREMKEYLOGGERATTACKSURFACEPATCHSIEMTHREATHUNTINGWORMBREACHREDTEAMSOCIALENGINEERINGEXPLOITPCICONFIDENTIALITYAVAILABILITYPHISHDMZROOTKITZOMBIEVULNERABILITYBRUTEFORCEATTACKTHREATINTELLIGENCEBYODPURPLETEAMVPNSOARHEADERSBLUETEAMINTEGRITYEDRIOTSPEARPHISHDDoSHONEYPOTPUA/PUPAPTPASSWORDSOCBLACKHATGRAYHATDOMAINCLOUD-BASEDANOMALYAIRANSOMWAREIOTWHITEHATUBAKILLCHAINC2CMACHINELEARNINGMETADATANOC2FASPOOFINGBOTNETZERO-DAYEPPPENTESTENCRYPTIONFIREWALLON-PREMKEYLOGGERATTACKSURFACEPATCHSIEMTHREATHUNTINGWORMBREACHREDTEAMSOCIALENGINEERINGEXPLOITPCICONFIDENTIALITYAVAILABILITYPHISHDMZROOTKITZOMBIEVULNERABILITYBRUTEFORCEATTACKTHREATINTELLIGENCEBYODPURPLETEAMVPNSOARHEADERSBLUETEAMINTEGRITYEDRIOTSPEARPHISHDDoSHONEYPOTPUA/PUP

InfoSec Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. APT
  2. PASSWORD
  3. SOC
  4. BLACKHAT
  5. GRAYHAT
  6. DOMAIN
  7. CLOUD-BASED
  8. ANOMALY
  9. AI
  10. RANSOMWARE
  11. IOT
  12. WHITEHAT
  13. UBA
  14. KILL CHAIN
  15. C2C
  16. MACHINE LEARNING
  17. METADATA
  18. NOC
  19. 2FA
  20. SPOOFING
  21. BOTNET
  22. ZERO-DAY
  23. EPP
  24. PENTEST
  25. ENCRYPTION
  26. FIREWALL
  27. ON-PREM
  28. KEYLOGGER
  29. ATTACK SURFACE
  30. PATCH
  31. SIEM
  32. THREAT HUNTING
  33. WORM
  34. BREACH
  35. RED TEAM
  36. SOCIAL ENGINEERING
  37. EXPLOIT
  38. PCI
  39. CONFIDENTIALITY
  40. AVAILABILITY
  41. PHISH
  42. DMZ
  43. ROOTKIT
  44. ZOMBIE
  45. VULNERABILITY
  46. BRUTE FORCE ATTACK
  47. THREAT INTELLIGENCE
  48. BYOD
  49. PURPLE TEAM
  50. VPN
  51. SOAR
  52. HEADERS
  53. BLUE TEAM
  54. INTEGRITY
  55. EDR
  56. IOT
  57. SPEARPHISH
  58. DDoS
  59. HONEYPOT
  60. PUA/PUP