PrivilegeEscalationEndpointsMITREATT&CKNISTReal-TimeControlsC2Rules ofEngagementCASBAlertDefenseZeroTrustDetectionsSIEMRansomwareRiskACLExploitAPTSplunkVulnerabilityFirewallWhiteHatHackerToolsKillChainThreatIntelSOCPrincipleof leastprivilegeDLPCyberDDoSTactics,Techniques,andProceduresSandboxBlackHatHackerResiliencyMalwareInsiderThreatEncryptionNextGen/NGFWIoT(Internetof Things)SocialEngineeringPhishingCloudDevSecOpsPrivilegeEscalationEndpointsMITREATT&CKNISTReal-TimeControlsC2Rules ofEngagementCASBAlertDefenseZeroTrustDetectionsSIEMRansomwareRiskACLExploitAPTSplunkVulnerabilityFirewallWhiteHatHackerToolsKillChainThreatIntelSOCPrincipleof leastprivilegeDLPCyberDDoSTactics,Techniques,andProceduresSandboxBlackHatHackerResiliencyMalwareInsiderThreatEncryptionNextGen/NGFWIoT(Internetof Things)SocialEngineeringPhishingCloudDevSecOps

IRM Digital Innovation - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Privilege Escalation
  2. Endpoints
  3. MITRE ATT&CK
  4. NIST
  5. Real-Time
  6. Controls
  7. C2
  8. Rules of Engagement
  9. CASB
  10. Alert
  11. Defense
  12. Zero Trust
  13. Detections
  14. SIEM
  15. Ransomware
  16. Risk
  17. ACL
  18. Exploit
  19. APT
  20. Splunk
  21. Vulnerability
  22. Firewall
  23. White Hat Hacker
  24. Tools
  25. Kill Chain
  26. Threat Intel
  27. SOC
  28. Principle of least privilege
  29. DLP
  30. Cyber
  31. DDoS
  32. Tactics, Techniques, and Procedures
  33. Sandbox
  34. Black Hat Hacker
  35. Resiliency
  36. Malware
  37. Insider Threat
  38. Encryption
  39. Next Gen/NGFW
  40. IoT (Internet of Things)
  41. Social Engineering
  42. Phishing
  43. Cloud
  44. DevSecOps