(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
Risk
Operational Security (OPSEC)
Command and Control (C2)
Human Intelligence (HUMINT)
Managed Detection and Response (MDR)
Digital Forensics and Incident Response (DFIR)
Continuous Risk Scanning (CRS)
ATT&CK
Advanced Persistent Threat (APT)
Legacy
Endpoint
Internet of Things (IoT)
Common Vulnerabilities & Exposures (CVE)
Threat Intelligence
Logs
Anti-Virus Software (AV)
End-Point Detection and Response (EDR)
Security Information and Event Management (SIEM)
Vulnerability
Ransomware
Defense in Depth
Exploit
Mitigate
Mean Time to Remediate (MTTR)
Security Operations Center (SOC)
Incident
Multi Factor Authentication (MFA)
Tactics, Techniques, and Procedures (TTP)
Penetration Test
Malware
Security Orchestration, Automation, and Response (SOAR)