Threat Intelligence Extended Detection and Response (XDR) Human Intelligence (HUMINT) Internet of Things (IoT) Malware Data Source Security Orchestration, Automation, and Response (SOAR) Mean Time to Detect (MTTD) Zero- Day ATT&CK Managed Detection and Response (MDR) Multi Factor Authentication (MFA) Indicator of Compromise (IOC) Command and Control (C2) Legacy Penetration Test Open Source Intelligence (OSINT) Configuration Management Database (CMDB) CIA Triad End-Point Detection and Response (EDR) Digital Forensics and Incident Response (DFIR) Logs Security Operations Center (SOC) Defense in Depth Cyber Insurance Security Information and Event Management (SIEM) Common Vulnerabilities & Exposures (CVE) Anti-Virus Software (AV) Advanced Persistent Threat (APT) Vulnerability Machine Learning Endpoint Tactics, Techniques, and Procedures (TTP) Continuous Risk Scanning (CRS) Exploit Operational Security (OPSEC) Risk Mitigate Cybersecurity Incident Mean Time to Remediate (MTTR) Ransomware Artificial Intelligence (AI) Threat Intelligence Extended Detection and Response (XDR) Human Intelligence (HUMINT) Internet of Things (IoT) Malware Data Source Security Orchestration, Automation, and Response (SOAR) Mean Time to Detect (MTTD) Zero- Day ATT&CK Managed Detection and Response (MDR) Multi Factor Authentication (MFA) Indicator of Compromise (IOC) Command and Control (C2) Legacy Penetration Test Open Source Intelligence (OSINT) Configuration Management Database (CMDB) CIA Triad End-Point Detection and Response (EDR) Digital Forensics and Incident Response (DFIR) Logs Security Operations Center (SOC) Defense in Depth Cyber Insurance Security Information and Event Management (SIEM) Common Vulnerabilities & Exposures (CVE) Anti-Virus Software (AV) Advanced Persistent Threat (APT) Vulnerability Machine Learning Endpoint Tactics, Techniques, and Procedures (TTP) Continuous Risk Scanning (CRS) Exploit Operational Security (OPSEC) Risk Mitigate Cybersecurity Incident Mean Time to Remediate (MTTR) Ransomware Artificial Intelligence (AI)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Intelligence
Extended Detection and Response (XDR)
Human Intelligence (HUMINT)
Internet of Things (IoT)
Malware
Data Source
Security Orchestration, Automation, and Response (SOAR)
Mean Time to Detect (MTTD)
Zero-Day
ATT&CK
Managed Detection and Response (MDR)
Multi Factor Authentication (MFA)
Indicator of Compromise (IOC)
Command and Control (C2)
Legacy
Penetration Test
Open Source Intelligence (OSINT)
Configuration Management Database (CMDB)
CIA Triad
End-Point Detection and Response (EDR)
Digital Forensics and Incident Response (DFIR)
Logs
Security Operations Center (SOC)
Defense in Depth
Cyber Insurance
Security Information and Event Management (SIEM)
Common Vulnerabilities & Exposures (CVE)
Anti-Virus Software (AV)
Advanced Persistent Threat (APT)
Vulnerability
Machine Learning
Endpoint
Tactics, Techniques, and Procedures (TTP)
Continuous Risk Scanning (CRS)
Exploit
Operational Security (OPSEC)
Risk
Mitigate
Cybersecurity
Incident
Mean Time to Remediate (MTTR)
Ransomware
Artificial Intelligence (AI)