Zero Trust CASB Principle of least privilege DevSecOps Phishing Malware Resiliency Vulnerability Tactics, Techniques, and Procedures Cloud C2 Exploit Privilege Escalation Alert Black Hat Hacker Kill Chain Risk Splunk Endpoints Rules of Engagement Ransomware Cyber Controls Tools Detections SOC IoT (Internet of Things) Firewall DDoS Sandbox Defense SIEM White Hat Hacker ACL Next Gen/NGFW Social Engineering Threat Intel NIST Insider Threat MITRE ATT&CK Encryption DLP Real- Time APT Zero Trust CASB Principle of least privilege DevSecOps Phishing Malware Resiliency Vulnerability Tactics, Techniques, and Procedures Cloud C2 Exploit Privilege Escalation Alert Black Hat Hacker Kill Chain Risk Splunk Endpoints Rules of Engagement Ransomware Cyber Controls Tools Detections SOC IoT (Internet of Things) Firewall DDoS Sandbox Defense SIEM White Hat Hacker ACL Next Gen/NGFW Social Engineering Threat Intel NIST Insider Threat MITRE ATT&CK Encryption DLP Real- Time APT
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero Trust
CASB
Principle of least privilege
DevSecOps
Phishing
Malware
Resiliency
Vulnerability
Tactics, Techniques, and Procedures
Cloud
C2
Exploit
Privilege Escalation
Alert
Black Hat Hacker
Kill Chain
Risk
Splunk
Endpoints
Rules of Engagement
Ransomware
Cyber
Controls
Tools
Detections
SOC
IoT (Internet of Things)
Firewall
DDoS
Sandbox
Defense
SIEM
White Hat Hacker
ACL
Next Gen/NGFW
Social Engineering
Threat Intel
NIST
Insider Threat
MITRE ATT&CK
Encryption
DLP
Real-Time
APT