ATT&CKMean TimetoRemediate(MTTR)CommandandControl(C2)Tactics,Techniques,andProcedures(TTP)CIATriadMeanTime toDetect(MTTD)ExploitExtendedDetectionandResponse(XDR)Indicator ofCompromise(IOC)CyberInsuranceDigitalForensicsand IncidentResponse(DFIR)MalwareThreatIntelligenceInternetof Things(IoT)AdvancedPersistentThreat(APT)Multi FactorAuthentication(MFA)OpenSourceIntelligence(OSINT)SecurityInformationand EventManagement(SIEM)DataSourceContinuousRiskScanning(CRS)ArtificialIntelligence(AI)MachineLearningZero-DayMitigateConfigurationManagementDatabase(CMDB)OperationalSecurity(OPSEC)LegacyVulnerabilityEndpointHumanIntelligence(HUMINT)RansomwareManagedDetectionandResponse(MDR)PenetrationTestEnd-PointDetectionandResponse(EDR)CommonVulnerabilities& Exposures(CVE)SecurityOrchestration,Automation,and Response(SOAR)Anti-VirusSoftware(AV)SecurityOperationsCenter(SOC)LogsIncidentRiskCybersecurityDefensein DepthATT&CKMean TimetoRemediate(MTTR)CommandandControl(C2)Tactics,Techniques,andProcedures(TTP)CIATriadMeanTime toDetect(MTTD)ExploitExtendedDetectionandResponse(XDR)Indicator ofCompromise(IOC)CyberInsuranceDigitalForensicsand IncidentResponse(DFIR)MalwareThreatIntelligenceInternetof Things(IoT)AdvancedPersistentThreat(APT)Multi FactorAuthentication(MFA)OpenSourceIntelligence(OSINT)SecurityInformationand EventManagement(SIEM)DataSourceContinuousRiskScanning(CRS)ArtificialIntelligence(AI)MachineLearningZero-DayMitigateConfigurationManagementDatabase(CMDB)OperationalSecurity(OPSEC)LegacyVulnerabilityEndpointHumanIntelligence(HUMINT)RansomwareManagedDetectionandResponse(MDR)PenetrationTestEnd-PointDetectionandResponse(EDR)CommonVulnerabilities& Exposures(CVE)SecurityOrchestration,Automation,and Response(SOAR)Anti-VirusSoftware(AV)SecurityOperationsCenter(SOC)LogsIncidentRiskCybersecurityDefensein Depth

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. ATT&CK
  2. Mean Time to Remediate (MTTR)
  3. Command and Control (C2)
  4. Tactics, Techniques, and Procedures (TTP)
  5. CIA Triad
  6. Mean Time to Detect (MTTD)
  7. Exploit
  8. Extended Detection and Response (XDR)
  9. Indicator of Compromise (IOC)
  10. Cyber Insurance
  11. Digital Forensics and Incident Response (DFIR)
  12. Malware
  13. Threat Intelligence
  14. Internet of Things (IoT)
  15. Advanced Persistent Threat (APT)
  16. Multi Factor Authentication (MFA)
  17. Open Source Intelligence (OSINT)
  18. Security Information and Event Management (SIEM)
  19. Data Source
  20. Continuous Risk Scanning (CRS)
  21. Artificial Intelligence (AI)
  22. Machine Learning
  23. Zero-Day
  24. Mitigate
  25. Configuration Management Database (CMDB)
  26. Operational Security (OPSEC)
  27. Legacy
  28. Vulnerability
  29. Endpoint
  30. Human Intelligence (HUMINT)
  31. Ransomware
  32. Managed Detection and Response (MDR)
  33. Penetration Test
  34. End-Point Detection and Response (EDR)
  35. Common Vulnerabilities & Exposures (CVE)
  36. Security Orchestration, Automation, and Response (SOAR)
  37. Anti-Virus Software (AV)
  38. Security Operations Center (SOC)
  39. Logs
  40. Incident
  41. Risk
  42. Cybersecurity
  43. Defense in Depth