Machine-to-MachineFrameworkIntegrateOperationsMaturityModelThreatsThreatInformedDefenseActorsUnity ofEffortSecurityOperationsCenterSynthesisAnalysisCyberThreatIntelligenceAutomation&OrchestrationHeatmapsCyberSecurityAPTMITREATT&CKCyberSecurityOperationsFederatedMSSPRiskCyberKillChainTTPsAttributionMachine-to-MachineFrameworkIntegrateOperationsMaturityModelThreatsThreatInformedDefenseActorsUnity ofEffortSecurityOperationsCenterSynthesisAnalysisCyberThreatIntelligenceAutomation&OrchestrationHeatmapsCyberSecurityAPTMITREATT&CKCyberSecurityOperationsFederatedMSSPRiskCyberKillChainTTPsAttribution

Cybersecurity BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Machine -to- Machine
  2. Framework
  3. Integrate Operations
  4. Maturity Model
  5. Threats
  6. Threat Informed Defense
  7. Actors
  8. Unity of Effort
  9. Security Operations Center
  10. Synthesis Analysis
  11. Cyber
  12. Threat Intelligence
  13. Automation & Orchestration
  14. Heatmaps
  15. Cyber Security
  16. APT
  17. MITRE ATT&CK
  18. Cyber Security Operations
  19. Federated
  20. MSSP
  21. Risk
  22. Cyber Kill Chain
  23. TTPs
  24. Attribution