Complexityvs SecuritySegmentationDevSecOpsEnd-To-EndDefensein DepthBaselineLeastPrivilegeTierV/VIEmulationMachineLearningIsolationVirtualizationFormalMethodsRCEFuzzingPrivEscMinimalSystemsLowHangingFruitTestbedHATTRICKStaticAnalysisExploitRedTeamingSymbolicExecution"SolvetheCybers"Complexityvs SecuritySegmentationDevSecOpsEnd-To-EndDefensein DepthBaselineLeastPrivilegeTierV/VIEmulationMachineLearningIsolationVirtualizationFormalMethodsRCEFuzzingPrivEscMinimalSystemsLowHangingFruitTestbedHATTRICKStaticAnalysisExploitRedTeamingSymbolicExecution"SolvetheCybers"

The Cyb3r$ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Complexity vs Security
  2. Segmentation
  3. DevSecOps
  4. End-To-End
  5. Defense in Depth
  6. Baseline
  7. Least Privilege
  8. Tier V/VI
  9. Emulation
  10. Machine Learning
  11. Isolation
  12. Virtualization
  13. Formal Methods
  14. RCE
  15. Fuzzing
  16. PrivEsc
  17. Minimal Systems
  18. Low Hanging Fruit
  19. Testbed
  20. HATTRICK
  21. Static Analysis
  22. Exploit
  23. Red Teaming
  24. Symbolic Execution
  25. "Solve the Cybers"