FirewallRiskSIEMNISTSocialEngineeringControlsSandboxResiliencyDefenseDetectionsBlackHatHackerKillChainMalwareSOCCyberToolsAPTZeroTrustPrincipleof leastprivilegeNextGen/NGFWReal-TimeACLSplunkC2MITREATT&CKCloudDLPInsiderThreatExploitAlertRules ofEngagementEndpointsPrivilegeEscalationDevSecOpsIoT(Internetof Things)RansomwareVulnerabilityEncryptionThreatIntelWhiteHatHackerDDoSTactics,Techniques,andProceduresCASBPhishingFirewallRiskSIEMNISTSocialEngineeringControlsSandboxResiliencyDefenseDetectionsBlackHatHackerKillChainMalwareSOCCyberToolsAPTZeroTrustPrincipleof leastprivilegeNextGen/NGFWReal-TimeACLSplunkC2MITREATT&CKCloudDLPInsiderThreatExploitAlertRules ofEngagementEndpointsPrivilegeEscalationDevSecOpsIoT(Internetof Things)RansomwareVulnerabilityEncryptionThreatIntelWhiteHatHackerDDoSTactics,Techniques,andProceduresCASBPhishing

IRM Digital Innovation - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Firewall
  2. Risk
  3. SIEM
  4. NIST
  5. Social Engineering
  6. Controls
  7. Sandbox
  8. Resiliency
  9. Defense
  10. Detections
  11. Black Hat Hacker
  12. Kill Chain
  13. Malware
  14. SOC
  15. Cyber
  16. Tools
  17. APT
  18. Zero Trust
  19. Principle of least privilege
  20. Next Gen/NGFW
  21. Real-Time
  22. ACL
  23. Splunk
  24. C2
  25. MITRE ATT&CK
  26. Cloud
  27. DLP
  28. Insider Threat
  29. Exploit
  30. Alert
  31. Rules of Engagement
  32. Endpoints
  33. Privilege Escalation
  34. DevSecOps
  35. IoT (Internet of Things)
  36. Ransomware
  37. Vulnerability
  38. Encryption
  39. Threat Intel
  40. White Hat Hacker
  41. DDoS
  42. Tactics, Techniques, and Procedures
  43. CASB
  44. Phishing