NIST DDoS Threat Intel ACL Zero Trust DevSecOps Privilege Escalation C2 Cyber Principle of least privilege Real- Time Detections White Hat Hacker Defense APT Exploit SOC Malware Resiliency IoT (Internet of Things) CASB Alert Ransomware Black Hat Hacker Encryption Rules of Engagement Splunk Sandbox Social Engineering Kill Chain Risk Tools Cloud Phishing SIEM Tactics, Techniques, and Procedures Insider Threat Endpoints Controls DLP Next Gen/NGFW Vulnerability Firewall MITRE ATT&CK NIST DDoS Threat Intel ACL Zero Trust DevSecOps Privilege Escalation C2 Cyber Principle of least privilege Real- Time Detections White Hat Hacker Defense APT Exploit SOC Malware Resiliency IoT (Internet of Things) CASB Alert Ransomware Black Hat Hacker Encryption Rules of Engagement Splunk Sandbox Social Engineering Kill Chain Risk Tools Cloud Phishing SIEM Tactics, Techniques, and Procedures Insider Threat Endpoints Controls DLP Next Gen/NGFW Vulnerability Firewall MITRE ATT&CK
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
NIST
DDoS
Threat Intel
ACL
Zero Trust
DevSecOps
Privilege Escalation
C2
Cyber
Principle of least privilege
Real-Time
Detections
White Hat Hacker
Defense
APT
Exploit
SOC
Malware
Resiliency
IoT (Internet of Things)
CASB
Alert
Ransomware
Black Hat Hacker
Encryption
Rules of Engagement
Splunk
Sandbox
Social Engineering
Kill Chain
Risk
Tools
Cloud
Phishing
SIEM
Tactics, Techniques, and Procedures
Insider Threat
Endpoints
Controls
DLP
Next Gen/NGFW
Vulnerability
Firewall
MITRE ATT&CK