Tactics, Techniques, and Procedures DLP Social Engineering SIEM Rules of Engagement Real- Time Ransomware DDoS Black Hat Hacker Insider Threat Endpoints Tools APT SOC MITRE ATT&CK ACL Zero Trust Cyber NIST Risk Cloud Threat Intel Firewall Vulnerability Principle of least privilege Next Gen/NGFW Defense CASB Alert DevSecOps Kill Chain Encryption IoT (Internet of Things) Privilege Escalation Exploit Sandbox White Hat Hacker Malware Detections Phishing Controls C2 Resiliency Splunk Tactics, Techniques, and Procedures DLP Social Engineering SIEM Rules of Engagement Real- Time Ransomware DDoS Black Hat Hacker Insider Threat Endpoints Tools APT SOC MITRE ATT&CK ACL Zero Trust Cyber NIST Risk Cloud Threat Intel Firewall Vulnerability Principle of least privilege Next Gen/NGFW Defense CASB Alert DevSecOps Kill Chain Encryption IoT (Internet of Things) Privilege Escalation Exploit Sandbox White Hat Hacker Malware Detections Phishing Controls C2 Resiliency Splunk
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Tactics, Techniques, and Procedures
DLP
Social Engineering
SIEM
Rules of Engagement
Real-Time
Ransomware
DDoS
Black Hat Hacker
Insider Threat
Endpoints
Tools
APT
SOC
MITRE ATT&CK
ACL
Zero Trust
Cyber
NIST
Risk
Cloud
Threat Intel
Firewall
Vulnerability
Principle of least privilege
Next Gen/NGFW
Defense
CASB
Alert
DevSecOps
Kill Chain
Encryption
IoT (Internet of Things)
Privilege Escalation
Exploit
Sandbox
White Hat Hacker
Malware
Detections
Phishing
Controls
C2
Resiliency
Splunk