Insider Threat ACL Kill Chain Cyber Sandbox C2 DevSecOps Tactics, Techniques, and Procedures Threat Intel Malware CASB Exploit Alert Endpoints Zero Trust Risk Detections Privilege Escalation Principle of least privilege White Hat Hacker Defense Encryption NIST SIEM Phishing Tools Real- Time IoT (Internet of Things) Resiliency Ransomware DDoS Controls Rules of Engagement Vulnerability Firewall APT MITRE ATT&CK SOC Splunk Next Gen/NGFW DLP Cloud Social Engineering Black Hat Hacker Insider Threat ACL Kill Chain Cyber Sandbox C2 DevSecOps Tactics, Techniques, and Procedures Threat Intel Malware CASB Exploit Alert Endpoints Zero Trust Risk Detections Privilege Escalation Principle of least privilege White Hat Hacker Defense Encryption NIST SIEM Phishing Tools Real- Time IoT (Internet of Things) Resiliency Ransomware DDoS Controls Rules of Engagement Vulnerability Firewall APT MITRE ATT&CK SOC Splunk Next Gen/NGFW DLP Cloud Social Engineering Black Hat Hacker
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider Threat
ACL
Kill Chain
Cyber
Sandbox
C2
DevSecOps
Tactics, Techniques, and Procedures
Threat Intel
Malware
CASB
Exploit
Alert
Endpoints
Zero Trust
Risk
Detections
Privilege Escalation
Principle of least privilege
White Hat Hacker
Defense
Encryption
NIST
SIEM
Phishing
Tools
Real-Time
IoT (Internet of Things)
Resiliency
Ransomware
DDoS
Controls
Rules of Engagement
Vulnerability
Firewall
APT
MITRE ATT&CK
SOC
Splunk
Next Gen/NGFW
DLP
Cloud
Social Engineering
Black Hat Hacker