BlackHatHackerEndpointsRules ofEngagementAPTDevSecOpsInsiderThreatPrincipleof leastprivilegeWhiteHatHackerMITREATT&CKPrivilegeEscalationFirewallSocialEngineeringPhishingCyberResiliencyRiskTactics,Techniques,andProceduresACLDLPCloudKillChainReal-TimeSplunkExploitSOCSIEMThreatIntelMalwareControlsEncryptionZeroTrustDefenseToolsNextGen/NGFWRansomwareAlertCASBVulnerabilitySandboxIoT(Internetof Things)C2DDoSDetectionsNISTBlackHatHackerEndpointsRules ofEngagementAPTDevSecOpsInsiderThreatPrincipleof leastprivilegeWhiteHatHackerMITREATT&CKPrivilegeEscalationFirewallSocialEngineeringPhishingCyberResiliencyRiskTactics,Techniques,andProceduresACLDLPCloudKillChainReal-TimeSplunkExploitSOCSIEMThreatIntelMalwareControlsEncryptionZeroTrustDefenseToolsNextGen/NGFWRansomwareAlertCASBVulnerabilitySandboxIoT(Internetof Things)C2DDoSDetectionsNIST

IRM Digital Innovation - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Black Hat Hacker
  2. Endpoints
  3. Rules of Engagement
  4. APT
  5. DevSecOps
  6. Insider Threat
  7. Principle of least privilege
  8. White Hat Hacker
  9. MITRE ATT&CK
  10. Privilege Escalation
  11. Firewall
  12. Social Engineering
  13. Phishing
  14. Cyber
  15. Resiliency
  16. Risk
  17. Tactics, Techniques, and Procedures
  18. ACL
  19. DLP
  20. Cloud
  21. Kill Chain
  22. Real-Time
  23. Splunk
  24. Exploit
  25. SOC
  26. SIEM
  27. Threat Intel
  28. Malware
  29. Controls
  30. Encryption
  31. Zero Trust
  32. Defense
  33. Tools
  34. Next Gen/NGFW
  35. Ransomware
  36. Alert
  37. CASB
  38. Vulnerability
  39. Sandbox
  40. IoT (Internet of Things)
  41. C2
  42. DDoS
  43. Detections
  44. NIST