SecurityOperationsCenter(SOC)ContinuousRiskScanning(CRS)VulnerabilityOperationalSecurity(OPSEC)RiskMulti FactorAuthentication(MFA)Tactics,Techniques,andProcedures(TTP)Defensein DepthCommonVulnerabilities& Exposures(CVE)Mean TimetoRemediate(MTTR)ArtificialIntelligence(AI)End-PointDetectionandResponse(EDR)MeanTime toDetect(MTTD)Internetof Things(IoT)EndpointAdvancedPersistentThreat(APT)HumanIntelligence(HUMINT)DigitalForensicsand IncidentResponse(DFIR)ATT&CKAnti-VirusSoftware(AV)ExploitCommandandControl(C2)Zero-DayCyberInsuranceExtendedDetectionandResponse(XDR)DataSourceLegacyIndicator ofCompromise(IOC)IncidentPenetrationTestOpenSourceIntelligence(OSINT)RansomwareThreatIntelligenceConfigurationManagementDatabase(CMDB)MachineLearningMalwareSecurityOrchestration,Automation,and Response(SOAR)CybersecurityLogsCIATriadManagedDetectionandResponse(MDR)MitigateSecurityInformationand EventManagement(SIEM)SecurityOperationsCenter(SOC)ContinuousRiskScanning(CRS)VulnerabilityOperationalSecurity(OPSEC)RiskMulti FactorAuthentication(MFA)Tactics,Techniques,andProcedures(TTP)Defensein DepthCommonVulnerabilities& Exposures(CVE)Mean TimetoRemediate(MTTR)ArtificialIntelligence(AI)End-PointDetectionandResponse(EDR)MeanTime toDetect(MTTD)Internetof Things(IoT)EndpointAdvancedPersistentThreat(APT)HumanIntelligence(HUMINT)DigitalForensicsand IncidentResponse(DFIR)ATT&CKAnti-VirusSoftware(AV)ExploitCommandandControl(C2)Zero-DayCyberInsuranceExtendedDetectionandResponse(XDR)DataSourceLegacyIndicator ofCompromise(IOC)IncidentPenetrationTestOpenSourceIntelligence(OSINT)RansomwareThreatIntelligenceConfigurationManagementDatabase(CMDB)MachineLearningMalwareSecurityOrchestration,Automation,and Response(SOAR)CybersecurityLogsCIATriadManagedDetectionandResponse(MDR)MitigateSecurityInformationand EventManagement(SIEM)

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. Security Operations Center (SOC)
  2. Continuous Risk Scanning (CRS)
  3. Vulnerability
  4. Operational Security (OPSEC)
  5. Risk
  6. Multi Factor Authentication (MFA)
  7. Tactics, Techniques, and Procedures (TTP)
  8. Defense in Depth
  9. Common Vulnerabilities & Exposures (CVE)
  10. Mean Time to Remediate (MTTR)
  11. Artificial Intelligence (AI)
  12. End-Point Detection and Response (EDR)
  13. Mean Time to Detect (MTTD)
  14. Internet of Things (IoT)
  15. Endpoint
  16. Advanced Persistent Threat (APT)
  17. Human Intelligence (HUMINT)
  18. Digital Forensics and Incident Response (DFIR)
  19. ATT&CK
  20. Anti-Virus Software (AV)
  21. Exploit
  22. Command and Control (C2)
  23. Zero-Day
  24. Cyber Insurance
  25. Extended Detection and Response (XDR)
  26. Data Source
  27. Legacy
  28. Indicator of Compromise (IOC)
  29. Incident
  30. Penetration Test
  31. Open Source Intelligence (OSINT)
  32. Ransomware
  33. Threat Intelligence
  34. Configuration Management Database (CMDB)
  35. Machine Learning
  36. Malware
  37. Security Orchestration, Automation, and Response (SOAR)
  38. Cybersecurity
  39. Logs
  40. CIA Triad
  41. Managed Detection and Response (MDR)
  42. Mitigate
  43. Security Information and Event Management (SIEM)