(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
Malware
Defense in Depth
Multi Factor Authentication (MFA)
Artificial Intelligence (AI)
Extended Detection and Response (XDR)
End-Point Detection and Response (EDR)
Cybersecurity
Cyber Insurance
Tactics, Techniques, and Procedures (TTP)
Advanced Persistent Threat (APT)
ATT&CK
Command and Control (C2)
Mitigate
Logs
Endpoint
Anti-Virus Software (AV)
Open Source Intelligence (OSINT)
Internet of Things (IoT)
Common Vulnerabilities & Exposures (CVE)
Operational Security (OPSEC)
Vulnerability
Security Operations Center (SOC)
Mean Time to Detect (MTTD)
Machine Learning
Threat Intelligence
Legacy
Configuration Management Database (CMDB)
Security Orchestration, Automation, and Response (SOAR)