Privilege Escalation Endpoints MITRE ATT&CK NIST Real- Time Controls C2 Rules of Engagement CASB Alert Defense Zero Trust Detections SIEM Ransomware Risk ACL Exploit APT Splunk Vulnerability Firewall White Hat Hacker Tools Kill Chain Threat Intel SOC Principle of least privilege DLP Cyber DDoS Tactics, Techniques, and Procedures Sandbox Black Hat Hacker Resiliency Malware Insider Threat Encryption Next Gen/NGFW IoT (Internet of Things) Social Engineering Phishing Cloud DevSecOps Privilege Escalation Endpoints MITRE ATT&CK NIST Real- Time Controls C2 Rules of Engagement CASB Alert Defense Zero Trust Detections SIEM Ransomware Risk ACL Exploit APT Splunk Vulnerability Firewall White Hat Hacker Tools Kill Chain Threat Intel SOC Principle of least privilege DLP Cyber DDoS Tactics, Techniques, and Procedures Sandbox Black Hat Hacker Resiliency Malware Insider Threat Encryption Next Gen/NGFW IoT (Internet of Things) Social Engineering Phishing Cloud DevSecOps
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Privilege Escalation
Endpoints
MITRE ATT&CK
NIST
Real-Time
Controls
C2
Rules of Engagement
CASB
Alert
Defense
Zero Trust
Detections
SIEM
Ransomware
Risk
ACL
Exploit
APT
Splunk
Vulnerability
Firewall
White Hat Hacker
Tools
Kill Chain
Threat Intel
SOC
Principle of least privilege
DLP
Cyber
DDoS
Tactics, Techniques, and Procedures
Sandbox
Black Hat Hacker
Resiliency
Malware
Insider Threat
Encryption
Next Gen/NGFW
IoT (Internet of Things)
Social Engineering
Phishing
Cloud
DevSecOps