(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
ATT&CK
Mean Time to Detect (MTTD)
Penetration Test
Open Source Intelligence (OSINT)
Operational Security (OPSEC)
End-Point Detection and Response (EDR)
Digital Forensics and Incident Response (DFIR)
Risk
Malware
CIA Triad
Threat Intelligence
Configuration Management Database (CMDB)
Ransomware
Mitigate
Security Information and Event Management (SIEM)
Zero-Day
Vulnerability
Mean Time to Remediate (MTTR)
Cyber Insurance
Exploit
Human Intelligence (HUMINT)
Artificial Intelligence (AI)
Machine Learning
Logs
Indicator of Compromise (IOC)
Security Operations Center (SOC)
Advanced Persistent Threat (APT)
Command and Control (C2)
Extended Detection and Response (XDR)
Multi Factor Authentication (MFA)
Incident
Legacy
Internet of Things (IoT)
Endpoint
Tactics, Techniques, and Procedures (TTP)
Anti-Virus Software (AV)
Defense in Depth
Managed Detection and Response (MDR)
Common Vulnerabilities & Exposures (CVE)
Cybersecurity
Data Source
Security Orchestration, Automation, and Response (SOAR)