Firewall Insider Threat DLP NIST SOC Next Gen/NGFW Sandbox Exploit Threat Intel Cyber Vulnerability Real- Time ACL Tactics, Techniques, and Procedures IoT (Internet of Things) Kill Chain Principle of least privilege DevSecOps Resiliency SIEM DDoS Controls MITRE ATT&CK Privilege Escalation Endpoints Cloud Rules of Engagement APT Splunk White Hat Hacker Black Hat Hacker Tools Detections Encryption Alert CASB Zero Trust Malware Ransomware C2 Phishing Risk Defense Social Engineering Firewall Insider Threat DLP NIST SOC Next Gen/NGFW Sandbox Exploit Threat Intel Cyber Vulnerability Real- Time ACL Tactics, Techniques, and Procedures IoT (Internet of Things) Kill Chain Principle of least privilege DevSecOps Resiliency SIEM DDoS Controls MITRE ATT&CK Privilege Escalation Endpoints Cloud Rules of Engagement APT Splunk White Hat Hacker Black Hat Hacker Tools Detections Encryption Alert CASB Zero Trust Malware Ransomware C2 Phishing Risk Defense Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Insider Threat
DLP
NIST
SOC
Next Gen/NGFW
Sandbox
Exploit
Threat Intel
Cyber
Vulnerability
Real-Time
ACL
Tactics, Techniques, and Procedures
IoT (Internet of Things)
Kill Chain
Principle of least privilege
DevSecOps
Resiliency
SIEM
DDoS
Controls
MITRE ATT&CK
Privilege Escalation
Endpoints
Cloud
Rules of Engagement
APT
Splunk
White Hat Hacker
Black Hat Hacker
Tools
Detections
Encryption
Alert
CASB
Zero Trust
Malware
Ransomware
C2
Phishing
Risk
Defense
Social Engineering