FrameworkHeatmapsThreatInformedDefenseSynthesisAnalysisMachine-to-MachineThreatsMSSPMITREATT&CKAPTUnity ofEffortFederatedCyberSecurityOperationsCyberSecurityRiskSecurityOperationsCenterCyberKillChainActorsThreatIntelligenceTTPsCyberAutomation&OrchestrationAttributionIntegrateOperationsMaturityModelFrameworkHeatmapsThreatInformedDefenseSynthesisAnalysisMachine-to-MachineThreatsMSSPMITREATT&CKAPTUnity ofEffortFederatedCyberSecurityOperationsCyberSecurityRiskSecurityOperationsCenterCyberKillChainActorsThreatIntelligenceTTPsCyberAutomation&OrchestrationAttributionIntegrateOperationsMaturityModel

Cybersecurity BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Framework
  2. Heatmaps
  3. Threat Informed Defense
  4. Synthesis Analysis
  5. Machine -to- Machine
  6. Threats
  7. MSSP
  8. MITRE ATT&CK
  9. APT
  10. Unity of Effort
  11. Federated
  12. Cyber Security Operations
  13. Cyber Security
  14. Risk
  15. Security Operations Center
  16. Cyber Kill Chain
  17. Actors
  18. Threat Intelligence
  19. TTPs
  20. Cyber
  21. Automation & Orchestration
  22. Attribution
  23. Integrate Operations
  24. Maturity Model