AttributionThreatInformedDefenseTTPsAutomation&OrchestrationThreatsAPTRiskCyberSecurityCyberHeatmapsCyberSecurityOperationsThreatIntelligenceFrameworkMSSPSynthesisAnalysisFederatedMachine-to-MachineMITREATT&CKCyberKillChainSecurityOperationsCenterMaturityModelUnity ofEffortIntegrateOperationsActorsAttributionThreatInformedDefenseTTPsAutomation&OrchestrationThreatsAPTRiskCyberSecurityCyberHeatmapsCyberSecurityOperationsThreatIntelligenceFrameworkMSSPSynthesisAnalysisFederatedMachine-to-MachineMITREATT&CKCyberKillChainSecurityOperationsCenterMaturityModelUnity ofEffortIntegrateOperationsActors

Cybersecurity BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Attribution
  2. Threat Informed Defense
  3. TTPs
  4. Automation & Orchestration
  5. Threats
  6. APT
  7. Risk
  8. Cyber Security
  9. Cyber
  10. Heatmaps
  11. Cyber Security Operations
  12. Threat Intelligence
  13. Framework
  14. MSSP
  15. Synthesis Analysis
  16. Federated
  17. Machine -to- Machine
  18. MITRE ATT&CK
  19. Cyber Kill Chain
  20. Security Operations Center
  21. Maturity Model
  22. Unity of Effort
  23. Integrate Operations
  24. Actors