APTCyberCyberSecurityOperationsHeatmapsRiskMITREATT&CKCyberSecurityMaturityModelMSSPUnity ofEffortSecurityOperationsCenterFrameworkThreatIntelligenceActorsAttributionFederatedThreatInformedDefenseCyberKillChainMachine-to-MachineTTPsAutomation&OrchestrationThreatsSynthesisAnalysisIntegrateOperationsAPTCyberCyberSecurityOperationsHeatmapsRiskMITREATT&CKCyberSecurityMaturityModelMSSPUnity ofEffortSecurityOperationsCenterFrameworkThreatIntelligenceActorsAttributionFederatedThreatInformedDefenseCyberKillChainMachine-to-MachineTTPsAutomation&OrchestrationThreatsSynthesisAnalysisIntegrateOperations

Cybersecurity BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. APT
  2. Cyber
  3. Cyber Security Operations
  4. Heatmaps
  5. Risk
  6. MITRE ATT&CK
  7. Cyber Security
  8. Maturity Model
  9. MSSP
  10. Unity of Effort
  11. Security Operations Center
  12. Framework
  13. Threat Intelligence
  14. Actors
  15. Attribution
  16. Federated
  17. Threat Informed Defense
  18. Cyber Kill Chain
  19. Machine -to- Machine
  20. TTPs
  21. Automation & Orchestration
  22. Threats
  23. Synthesis Analysis
  24. Integrate Operations