EmulationIsolationLowHangingFruitVirtualizationEnd-To-EndDefensein DepthStaticAnalysis"SolvetheCybers"FuzzingBaselineTierV/VISegmentationTestbedRCEMinimalSystemsRedTeamingExploitHATTRICKSymbolicExecutionPrivEscComplexityvs SecurityLeastPrivilegeDevSecOpsFormalMethodsMachineLearningEmulationIsolationLowHangingFruitVirtualizationEnd-To-EndDefensein DepthStaticAnalysis"SolvetheCybers"FuzzingBaselineTierV/VISegmentationTestbedRCEMinimalSystemsRedTeamingExploitHATTRICKSymbolicExecutionPrivEscComplexityvs SecurityLeastPrivilegeDevSecOpsFormalMethodsMachineLearning

The Cyb3r$ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Emulation
  2. Isolation
  3. Low Hanging Fruit
  4. Virtualization
  5. End-To-End
  6. Defense in Depth
  7. Static Analysis
  8. "Solve the Cybers"
  9. Fuzzing
  10. Baseline
  11. Tier V/VI
  12. Segmentation
  13. Testbed
  14. RCE
  15. Minimal Systems
  16. Red Teaming
  17. Exploit
  18. HATTRICK
  19. Symbolic Execution
  20. PrivEsc
  21. Complexity vs Security
  22. Least Privilege
  23. DevSecOps
  24. Formal Methods
  25. Machine Learning