Firewall Risk SIEM NIST Social Engineering Controls Sandbox Resiliency Defense Detections Black Hat Hacker Kill Chain Malware SOC Cyber Tools APT Zero Trust Principle of least privilege Next Gen/NGFW Real- Time ACL Splunk C2 MITRE ATT&CK Cloud DLP Insider Threat Exploit Alert Rules of Engagement Endpoints Privilege Escalation DevSecOps IoT (Internet of Things) Ransomware Vulnerability Encryption Threat Intel White Hat Hacker DDoS Tactics, Techniques, and Procedures CASB Phishing Firewall Risk SIEM NIST Social Engineering Controls Sandbox Resiliency Defense Detections Black Hat Hacker Kill Chain Malware SOC Cyber Tools APT Zero Trust Principle of least privilege Next Gen/NGFW Real- Time ACL Splunk C2 MITRE ATT&CK Cloud DLP Insider Threat Exploit Alert Rules of Engagement Endpoints Privilege Escalation DevSecOps IoT (Internet of Things) Ransomware Vulnerability Encryption Threat Intel White Hat Hacker DDoS Tactics, Techniques, and Procedures CASB Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Risk
SIEM
NIST
Social Engineering
Controls
Sandbox
Resiliency
Defense
Detections
Black Hat Hacker
Kill Chain
Malware
SOC
Cyber
Tools
APT
Zero Trust
Principle of least privilege
Next Gen/NGFW
Real-Time
ACL
Splunk
C2
MITRE ATT&CK
Cloud
DLP
Insider Threat
Exploit
Alert
Rules of Engagement
Endpoints
Privilege Escalation
DevSecOps
IoT (Internet of Things)
Ransomware
Vulnerability
Encryption
Threat Intel
White Hat Hacker
DDoS
Tactics, Techniques, and Procedures
CASB
Phishing