ExtendedDetectionandResponse(XDR)Tactics,Techniques,andProcedures(TTP)Mean TimetoRemediate(MTTR)SecurityInformationand EventManagement(SIEM)DataSourceEnd-PointDetectionandResponse(EDR)OperationalSecurity(OPSEC)MachineLearningIncidentManagedDetectionandResponse(MDR)PenetrationTestThreatIntelligenceAnti-VirusSoftware(AV)CybersecurityRiskCommandandControl(C2)ContinuousRiskScanning(CRS)MalwareAdvancedPersistentThreat(APT)Internetof Things(IoT)ATT&CKRansomwareExploitArtificialIntelligence(AI)LegacySecurityOrchestration,Automation,and Response(SOAR)MitigateLogsCIATriadDefensein DepthMeanTime toDetect(MTTD)ConfigurationManagementDatabase(CMDB)VulnerabilityDigitalForensicsand IncidentResponse(DFIR)Zero-DayCyberInsuranceHumanIntelligence(HUMINT)EndpointCommonVulnerabilities& Exposures(CVE)Indicator ofCompromise(IOC)SecurityOperationsCenter(SOC)Multi FactorAuthentication(MFA)OpenSourceIntelligence(OSINT)ExtendedDetectionandResponse(XDR)Tactics,Techniques,andProcedures(TTP)Mean TimetoRemediate(MTTR)SecurityInformationand EventManagement(SIEM)DataSourceEnd-PointDetectionandResponse(EDR)OperationalSecurity(OPSEC)MachineLearningIncidentManagedDetectionandResponse(MDR)PenetrationTestThreatIntelligenceAnti-VirusSoftware(AV)CybersecurityRiskCommandandControl(C2)ContinuousRiskScanning(CRS)MalwareAdvancedPersistentThreat(APT)Internetof Things(IoT)ATT&CKRansomwareExploitArtificialIntelligence(AI)LegacySecurityOrchestration,Automation,and Response(SOAR)MitigateLogsCIATriadDefensein DepthMeanTime toDetect(MTTD)ConfigurationManagementDatabase(CMDB)VulnerabilityDigitalForensicsand IncidentResponse(DFIR)Zero-DayCyberInsuranceHumanIntelligence(HUMINT)EndpointCommonVulnerabilities& Exposures(CVE)Indicator ofCompromise(IOC)SecurityOperationsCenter(SOC)Multi FactorAuthentication(MFA)OpenSourceIntelligence(OSINT)

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. Extended Detection and Response (XDR)
  2. Tactics, Techniques, and Procedures (TTP)
  3. Mean Time to Remediate (MTTR)
  4. Security Information and Event Management (SIEM)
  5. Data Source
  6. End-Point Detection and Response (EDR)
  7. Operational Security (OPSEC)
  8. Machine Learning
  9. Incident
  10. Managed Detection and Response (MDR)
  11. Penetration Test
  12. Threat Intelligence
  13. Anti-Virus Software (AV)
  14. Cybersecurity
  15. Risk
  16. Command and Control (C2)
  17. Continuous Risk Scanning (CRS)
  18. Malware
  19. Advanced Persistent Threat (APT)
  20. Internet of Things (IoT)
  21. ATT&CK
  22. Ransomware
  23. Exploit
  24. Artificial Intelligence (AI)
  25. Legacy
  26. Security Orchestration, Automation, and Response (SOAR)
  27. Mitigate
  28. Logs
  29. CIA Triad
  30. Defense in Depth
  31. Mean Time to Detect (MTTD)
  32. Configuration Management Database (CMDB)
  33. Vulnerability
  34. Digital Forensics and Incident Response (DFIR)
  35. Zero-Day
  36. Cyber Insurance
  37. Human Intelligence (HUMINT)
  38. Endpoint
  39. Common Vulnerabilities & Exposures (CVE)
  40. Indicator of Compromise (IOC)
  41. Security Operations Center (SOC)
  42. Multi Factor Authentication (MFA)
  43. Open Source Intelligence (OSINT)