SandboxDefenseCyberControlsDetectionsKillChainCloudRules ofEngagementSIEMSocialEngineeringEndpointsPhishingZeroTrustDLPMalwarePrivilegeEscalationReal-TimePrincipleof leastprivilegeACLEncryptionC2DDoSFirewallSOCVulnerabilityResiliencyExploitThreatIntelAPTNextGen/NGFWCASBAlertRansomwareWhiteHatHackerInsiderThreatDevSecOpsTactics,Techniques,andProceduresIoT(Internetof Things)RiskSplunkMITREATT&CKNISTToolsBlackHatHackerSandboxDefenseCyberControlsDetectionsKillChainCloudRules ofEngagementSIEMSocialEngineeringEndpointsPhishingZeroTrustDLPMalwarePrivilegeEscalationReal-TimePrincipleof leastprivilegeACLEncryptionC2DDoSFirewallSOCVulnerabilityResiliencyExploitThreatIntelAPTNextGen/NGFWCASBAlertRansomwareWhiteHatHackerInsiderThreatDevSecOpsTactics,Techniques,andProceduresIoT(Internetof Things)RiskSplunkMITREATT&CKNISTToolsBlackHatHacker

IRM Digital Innovation - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Sandbox
  2. Defense
  3. Cyber
  4. Controls
  5. Detections
  6. Kill Chain
  7. Cloud
  8. Rules of Engagement
  9. SIEM
  10. Social Engineering
  11. Endpoints
  12. Phishing
  13. Zero Trust
  14. DLP
  15. Malware
  16. Privilege Escalation
  17. Real-Time
  18. Principle of least privilege
  19. ACL
  20. Encryption
  21. C2
  22. DDoS
  23. Firewall
  24. SOC
  25. Vulnerability
  26. Resiliency
  27. Exploit
  28. Threat Intel
  29. APT
  30. Next Gen/NGFW
  31. CASB
  32. Alert
  33. Ransomware
  34. White Hat Hacker
  35. Insider Threat
  36. DevSecOps
  37. Tactics, Techniques, and Procedures
  38. IoT (Internet of Things)
  39. Risk
  40. Splunk
  41. MITRE ATT&CK
  42. NIST
  43. Tools
  44. Black Hat Hacker