(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
ATT&CK
Incident
Operational Security (OPSEC)
Threat Intelligence
Common Vulnerabilities & Exposures (CVE)
Anti-Virus Software (AV)
End-Point Detection and Response (EDR)
Exploit
Machine Learning
Vulnerability
Mitigate
Zero-Day
Continuous Risk Scanning (CRS)
Ransomware
Malware
Advanced Persistent Threat (APT)
Security Information and Event Management (SIEM)
Defense in Depth
Penetration Test
Security Operations Center (SOC)
Legacy
Logs
Human Intelligence (HUMINT)
Endpoint
Extended Detection and Response (XDR)
Digital Forensics and Incident Response (DFIR)
CIA Triad
Cyber Insurance
Security Orchestration, Automation, and Response (SOAR)