Cloud Tools Next Gen/NGFW Alert Endpoints Detections Splunk White Hat Hacker Principle of least privilege Cyber Defense IoT (Internet of Things) Vulnerability Kill Chain Privilege Escalation ACL Controls Phishing NIST Social Engineering Malware Insider Threat Firewall Real- Time Exploit Tactics, Techniques, and Procedures Black Hat Hacker Sandbox Encryption SOC DevSecOps SIEM Risk MITRE ATT&CK Rules of Engagement C2 APT CASB Resiliency Ransomware DDoS Zero Trust Threat Intel DLP Cloud Tools Next Gen/NGFW Alert Endpoints Detections Splunk White Hat Hacker Principle of least privilege Cyber Defense IoT (Internet of Things) Vulnerability Kill Chain Privilege Escalation ACL Controls Phishing NIST Social Engineering Malware Insider Threat Firewall Real- Time Exploit Tactics, Techniques, and Procedures Black Hat Hacker Sandbox Encryption SOC DevSecOps SIEM Risk MITRE ATT&CK Rules of Engagement C2 APT CASB Resiliency Ransomware DDoS Zero Trust Threat Intel DLP
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud
Tools
Next Gen/NGFW
Alert
Endpoints
Detections
Splunk
White Hat Hacker
Principle of least privilege
Cyber
Defense
IoT (Internet of Things)
Vulnerability
Kill Chain
Privilege Escalation
ACL
Controls
Phishing
NIST
Social Engineering
Malware
Insider Threat
Firewall
Real-Time
Exploit
Tactics, Techniques, and Procedures
Black Hat Hacker
Sandbox
Encryption
SOC
DevSecOps
SIEM
Risk
MITRE ATT&CK
Rules of Engagement
C2
APT
CASB
Resiliency
Ransomware
DDoS
Zero Trust
Threat Intel
DLP