(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
Security Operations Center (SOC)
Continuous Risk Scanning (CRS)
Vulnerability
Operational Security (OPSEC)
Risk
Multi Factor Authentication (MFA)
Tactics, Techniques, and Procedures (TTP)
Defense in Depth
Common Vulnerabilities & Exposures (CVE)
Mean Time to Remediate (MTTR)
Artificial Intelligence (AI)
End-Point Detection and Response (EDR)
Mean Time to Detect (MTTD)
Internet of Things (IoT)
Endpoint
Advanced Persistent Threat (APT)
Human Intelligence (HUMINT)
Digital Forensics and Incident Response (DFIR)
ATT&CK
Anti-Virus Software (AV)
Exploit
Command and Control (C2)
Zero-Day
Cyber Insurance
Extended Detection and Response (XDR)
Data Source
Legacy
Indicator of Compromise (IOC)
Incident
Penetration Test
Open Source Intelligence (OSINT)
Ransomware
Threat Intelligence
Configuration Management Database (CMDB)
Machine Learning
Malware
Security Orchestration, Automation, and Response (SOAR)