ATT&CKIncidentOperationalSecurity(OPSEC)ThreatIntelligenceCommonVulnerabilities& Exposures(CVE)Anti-VirusSoftware(AV)End-PointDetectionandResponse(EDR)ExploitMachineLearningVulnerabilityMitigateZero-DayContinuousRiskScanning(CRS)RansomwareMalwareAdvancedPersistentThreat(APT)SecurityInformationand EventManagement(SIEM)Defensein DepthPenetrationTestSecurityOperationsCenter(SOC)LegacyLogsHumanIntelligence(HUMINT)EndpointExtendedDetectionandResponse(XDR)DigitalForensicsand IncidentResponse(DFIR)CIATriadCyberInsuranceSecurityOrchestration,Automation,and Response(SOAR)ManagedDetectionandResponse(MDR)Internetof Things(IoT)Indicator ofCompromise(IOC)Mean TimetoRemediate(MTTR)CybersecurityCommandandControl(C2)MeanTime toDetect(MTTD)ConfigurationManagementDatabase(CMDB)OpenSourceIntelligence(OSINT)ArtificialIntelligence(AI)DataSourceRiskMulti FactorAuthentication(MFA)Tactics,Techniques,andProcedures(TTP)ATT&CKIncidentOperationalSecurity(OPSEC)ThreatIntelligenceCommonVulnerabilities& Exposures(CVE)Anti-VirusSoftware(AV)End-PointDetectionandResponse(EDR)ExploitMachineLearningVulnerabilityMitigateZero-DayContinuousRiskScanning(CRS)RansomwareMalwareAdvancedPersistentThreat(APT)SecurityInformationand EventManagement(SIEM)Defensein DepthPenetrationTestSecurityOperationsCenter(SOC)LegacyLogsHumanIntelligence(HUMINT)EndpointExtendedDetectionandResponse(XDR)DigitalForensicsand IncidentResponse(DFIR)CIATriadCyberInsuranceSecurityOrchestration,Automation,and Response(SOAR)ManagedDetectionandResponse(MDR)Internetof Things(IoT)Indicator ofCompromise(IOC)Mean TimetoRemediate(MTTR)CybersecurityCommandandControl(C2)MeanTime toDetect(MTTD)ConfigurationManagementDatabase(CMDB)OpenSourceIntelligence(OSINT)ArtificialIntelligence(AI)DataSourceRiskMulti FactorAuthentication(MFA)Tactics,Techniques,andProcedures(TTP)

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. ATT&CK
  2. Incident
  3. Operational Security (OPSEC)
  4. Threat Intelligence
  5. Common Vulnerabilities & Exposures (CVE)
  6. Anti-Virus Software (AV)
  7. End-Point Detection and Response (EDR)
  8. Exploit
  9. Machine Learning
  10. Vulnerability
  11. Mitigate
  12. Zero-Day
  13. Continuous Risk Scanning (CRS)
  14. Ransomware
  15. Malware
  16. Advanced Persistent Threat (APT)
  17. Security Information and Event Management (SIEM)
  18. Defense in Depth
  19. Penetration Test
  20. Security Operations Center (SOC)
  21. Legacy
  22. Logs
  23. Human Intelligence (HUMINT)
  24. Endpoint
  25. Extended Detection and Response (XDR)
  26. Digital Forensics and Incident Response (DFIR)
  27. CIA Triad
  28. Cyber Insurance
  29. Security Orchestration, Automation, and Response (SOAR)
  30. Managed Detection and Response (MDR)
  31. Internet of Things (IoT)
  32. Indicator of Compromise (IOC)
  33. Mean Time to Remediate (MTTR)
  34. Cybersecurity
  35. Command and Control (C2)
  36. Mean Time to Detect (MTTD)
  37. Configuration Management Database (CMDB)
  38. Open Source Intelligence (OSINT)
  39. Artificial Intelligence (AI)
  40. Data Source
  41. Risk
  42. Multi Factor Authentication (MFA)
  43. Tactics, Techniques, and Procedures (TTP)