Black Hat Hacker Endpoints Rules of Engagement APT DevSecOps Insider Threat Principle of least privilege White Hat Hacker MITRE ATT&CK Privilege Escalation Firewall Social Engineering Phishing Cyber Resiliency Risk Tactics, Techniques, and Procedures ACL DLP Cloud Kill Chain Real- Time Splunk Exploit SOC SIEM Threat Intel Malware Controls Encryption Zero Trust Defense Tools Next Gen/NGFW Ransomware Alert CASB Vulnerability Sandbox IoT (Internet of Things) C2 DDoS Detections NIST Black Hat Hacker Endpoints Rules of Engagement APT DevSecOps Insider Threat Principle of least privilege White Hat Hacker MITRE ATT&CK Privilege Escalation Firewall Social Engineering Phishing Cyber Resiliency Risk Tactics, Techniques, and Procedures ACL DLP Cloud Kill Chain Real- Time Splunk Exploit SOC SIEM Threat Intel Malware Controls Encryption Zero Trust Defense Tools Next Gen/NGFW Ransomware Alert CASB Vulnerability Sandbox IoT (Internet of Things) C2 DDoS Detections NIST
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Black Hat Hacker
Endpoints
Rules of Engagement
APT
DevSecOps
Insider Threat
Principle of least privilege
White Hat Hacker
MITRE ATT&CK
Privilege Escalation
Firewall
Social Engineering
Phishing
Cyber
Resiliency
Risk
Tactics, Techniques, and Procedures
ACL
DLP
Cloud
Kill Chain
Real-Time
Splunk
Exploit
SOC
SIEM
Threat Intel
Malware
Controls
Encryption
Zero Trust
Defense
Tools
Next Gen/NGFW
Ransomware
Alert
CASB
Vulnerability
Sandbox
IoT (Internet of Things)
C2
DDoS
Detections
NIST