Tactics,Techniques,andProceduresDLPSocialEngineeringSIEMRules ofEngagementReal-TimeRansomwareDDoSBlackHatHackerInsiderThreatEndpointsToolsAPTSOCMITREATT&CKACLZeroTrustCyberNISTRiskCloudThreatIntelFirewallVulnerabilityPrincipleof leastprivilegeNextGen/NGFWDefenseCASBAlertDevSecOpsKillChainEncryptionIoT(Internetof Things)PrivilegeEscalationExploitSandboxWhiteHatHackerMalwareDetectionsPhishingControlsC2ResiliencySplunkTactics,Techniques,andProceduresDLPSocialEngineeringSIEMRules ofEngagementReal-TimeRansomwareDDoSBlackHatHackerInsiderThreatEndpointsToolsAPTSOCMITREATT&CKACLZeroTrustCyberNISTRiskCloudThreatIntelFirewallVulnerabilityPrincipleof leastprivilegeNextGen/NGFWDefenseCASBAlertDevSecOpsKillChainEncryptionIoT(Internetof Things)PrivilegeEscalationExploitSandboxWhiteHatHackerMalwareDetectionsPhishingControlsC2ResiliencySplunk

IRM Digital Innovation - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Tactics, Techniques, and Procedures
  2. DLP
  3. Social Engineering
  4. SIEM
  5. Rules of Engagement
  6. Real-Time
  7. Ransomware
  8. DDoS
  9. Black Hat Hacker
  10. Insider Threat
  11. Endpoints
  12. Tools
  13. APT
  14. SOC
  15. MITRE ATT&CK
  16. ACL
  17. Zero Trust
  18. Cyber
  19. NIST
  20. Risk
  21. Cloud
  22. Threat Intel
  23. Firewall
  24. Vulnerability
  25. Principle of least privilege
  26. Next Gen/NGFW
  27. Defense
  28. CASB
  29. Alert
  30. DevSecOps
  31. Kill Chain
  32. Encryption
  33. IoT (Internet of Things)
  34. Privilege Escalation
  35. Exploit
  36. Sandbox
  37. White Hat Hacker
  38. Malware
  39. Detections
  40. Phishing
  41. Controls
  42. C2
  43. Resiliency
  44. Splunk