FirewallInsiderThreatDLPNISTSOCNextGen/NGFWSandboxExploitThreatIntelCyberVulnerabilityReal-TimeACLTactics,Techniques,andProceduresIoT(Internetof Things)KillChainPrincipleof leastprivilegeDevSecOpsResiliencySIEMDDoSControlsMITREATT&CKPrivilegeEscalationEndpointsCloudRules ofEngagementAPTSplunkWhiteHatHackerBlackHatHackerToolsDetectionsEncryptionAlertCASBZeroTrustMalwareRansomwareC2PhishingRiskDefenseSocialEngineeringFirewallInsiderThreatDLPNISTSOCNextGen/NGFWSandboxExploitThreatIntelCyberVulnerabilityReal-TimeACLTactics,Techniques,andProceduresIoT(Internetof Things)KillChainPrincipleof leastprivilegeDevSecOpsResiliencySIEMDDoSControlsMITREATT&CKPrivilegeEscalationEndpointsCloudRules ofEngagementAPTSplunkWhiteHatHackerBlackHatHackerToolsDetectionsEncryptionAlertCASBZeroTrustMalwareRansomwareC2PhishingRiskDefenseSocialEngineering

IRM Digital Innovation - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Firewall
  2. Insider Threat
  3. DLP
  4. NIST
  5. SOC
  6. Next Gen/NGFW
  7. Sandbox
  8. Exploit
  9. Threat Intel
  10. Cyber
  11. Vulnerability
  12. Real-Time
  13. ACL
  14. Tactics, Techniques, and Procedures
  15. IoT (Internet of Things)
  16. Kill Chain
  17. Principle of least privilege
  18. DevSecOps
  19. Resiliency
  20. SIEM
  21. DDoS
  22. Controls
  23. MITRE ATT&CK
  24. Privilege Escalation
  25. Endpoints
  26. Cloud
  27. Rules of Engagement
  28. APT
  29. Splunk
  30. White Hat Hacker
  31. Black Hat Hacker
  32. Tools
  33. Detections
  34. Encryption
  35. Alert
  36. CASB
  37. Zero Trust
  38. Malware
  39. Ransomware
  40. C2
  41. Phishing
  42. Risk
  43. Defense
  44. Social Engineering