InsiderThreatACLKillChainCyberSandboxC2DevSecOpsTactics,Techniques,andProceduresThreatIntelMalwareCASBExploitAlertEndpointsZeroTrustRiskDetectionsPrivilegeEscalationPrincipleof leastprivilegeWhiteHatHackerDefenseEncryptionNISTSIEMPhishingToolsReal-TimeIoT(Internetof Things)ResiliencyRansomwareDDoSControlsRules ofEngagementVulnerabilityFirewallAPTMITREATT&CKSOCSplunkNextGen/NGFWDLPCloudSocialEngineeringBlackHatHackerInsiderThreatACLKillChainCyberSandboxC2DevSecOpsTactics,Techniques,andProceduresThreatIntelMalwareCASBExploitAlertEndpointsZeroTrustRiskDetectionsPrivilegeEscalationPrincipleof leastprivilegeWhiteHatHackerDefenseEncryptionNISTSIEMPhishingToolsReal-TimeIoT(Internetof Things)ResiliencyRansomwareDDoSControlsRules ofEngagementVulnerabilityFirewallAPTMITREATT&CKSOCSplunkNextGen/NGFWDLPCloudSocialEngineeringBlackHatHacker

IRM Digital Innovation - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Insider Threat
  2. ACL
  3. Kill Chain
  4. Cyber
  5. Sandbox
  6. C2
  7. DevSecOps
  8. Tactics, Techniques, and Procedures
  9. Threat Intel
  10. Malware
  11. CASB
  12. Exploit
  13. Alert
  14. Endpoints
  15. Zero Trust
  16. Risk
  17. Detections
  18. Privilege Escalation
  19. Principle of least privilege
  20. White Hat Hacker
  21. Defense
  22. Encryption
  23. NIST
  24. SIEM
  25. Phishing
  26. Tools
  27. Real-Time
  28. IoT (Internet of Things)
  29. Resiliency
  30. Ransomware
  31. DDoS
  32. Controls
  33. Rules of Engagement
  34. Vulnerability
  35. Firewall
  36. APT
  37. MITRE ATT&CK
  38. SOC
  39. Splunk
  40. Next Gen/NGFW
  41. DLP
  42. Cloud
  43. Social Engineering
  44. Black Hat Hacker