Sandbox Defense Cyber Controls Detections Kill Chain Cloud Rules of Engagement SIEM Social Engineering Endpoints Phishing Zero Trust DLP Malware Privilege Escalation Real- Time Principle of least privilege ACL Encryption C2 DDoS Firewall SOC Vulnerability Resiliency Exploit Threat Intel APT Next Gen/NGFW CASB Alert Ransomware White Hat Hacker Insider Threat DevSecOps Tactics, Techniques, and Procedures IoT (Internet of Things) Risk Splunk MITRE ATT&CK NIST Tools Black Hat Hacker Sandbox Defense Cyber Controls Detections Kill Chain Cloud Rules of Engagement SIEM Social Engineering Endpoints Phishing Zero Trust DLP Malware Privilege Escalation Real- Time Principle of least privilege ACL Encryption C2 DDoS Firewall SOC Vulnerability Resiliency Exploit Threat Intel APT Next Gen/NGFW CASB Alert Ransomware White Hat Hacker Insider Threat DevSecOps Tactics, Techniques, and Procedures IoT (Internet of Things) Risk Splunk MITRE ATT&CK NIST Tools Black Hat Hacker
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Sandbox
Defense
Cyber
Controls
Detections
Kill Chain
Cloud
Rules of Engagement
SIEM
Social Engineering
Endpoints
Phishing
Zero Trust
DLP
Malware
Privilege Escalation
Real-Time
Principle of least privilege
ACL
Encryption
C2
DDoS
Firewall
SOC
Vulnerability
Resiliency
Exploit
Threat Intel
APT
Next Gen/NGFW
CASB
Alert
Ransomware
White Hat Hacker
Insider Threat
DevSecOps
Tactics, Techniques, and Procedures
IoT (Internet of Things)
Risk
Splunk
MITRE ATT&CK
NIST
Tools
Black Hat Hacker