MitigateTactics,Techniques,andProcedures(TTP)Defensein DepthRiskIndicator ofCompromise(IOC)LegacyMeanTime toDetect(MTTD)VulnerabilityMean TimetoRemediate(MTTR)ExploitMachineLearningInternetof Things(IoT)IncidentOpenSourceIntelligence(OSINT)SecurityOrchestration,Automation,and Response(SOAR)Zero-DayAnti-VirusSoftware(AV)LogsCommonVulnerabilities& Exposures(CVE)DataSourceConfigurationManagementDatabase(CMDB)ManagedDetectionandResponse(MDR)OperationalSecurity(OPSEC)ThreatIntelligenceRansomwareSecurityOperationsCenter(SOC)EndpointHumanIntelligence(HUMINT)PenetrationTestCyberInsuranceArtificialIntelligence(AI)DigitalForensicsand IncidentResponse(DFIR)Multi FactorAuthentication(MFA)ContinuousRiskScanning(CRS)End-PointDetectionandResponse(EDR)ExtendedDetectionandResponse(XDR)AdvancedPersistentThreat(APT)SecurityInformationand EventManagement(SIEM)CommandandControl(C2)ATT&CKCIATriadMalwareCybersecurityMitigateTactics,Techniques,andProcedures(TTP)Defensein DepthRiskIndicator ofCompromise(IOC)LegacyMeanTime toDetect(MTTD)VulnerabilityMean TimetoRemediate(MTTR)ExploitMachineLearningInternetof Things(IoT)IncidentOpenSourceIntelligence(OSINT)SecurityOrchestration,Automation,and Response(SOAR)Zero-DayAnti-VirusSoftware(AV)LogsCommonVulnerabilities& Exposures(CVE)DataSourceConfigurationManagementDatabase(CMDB)ManagedDetectionandResponse(MDR)OperationalSecurity(OPSEC)ThreatIntelligenceRansomwareSecurityOperationsCenter(SOC)EndpointHumanIntelligence(HUMINT)PenetrationTestCyberInsuranceArtificialIntelligence(AI)DigitalForensicsand IncidentResponse(DFIR)Multi FactorAuthentication(MFA)ContinuousRiskScanning(CRS)End-PointDetectionandResponse(EDR)ExtendedDetectionandResponse(XDR)AdvancedPersistentThreat(APT)SecurityInformationand EventManagement(SIEM)CommandandControl(C2)ATT&CKCIATriadMalwareCybersecurity

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. Mitigate
  2. Tactics, Techniques, and Procedures (TTP)
  3. Defense in Depth
  4. Risk
  5. Indicator of Compromise (IOC)
  6. Legacy
  7. Mean Time to Detect (MTTD)
  8. Vulnerability
  9. Mean Time to Remediate (MTTR)
  10. Exploit
  11. Machine Learning
  12. Internet of Things (IoT)
  13. Incident
  14. Open Source Intelligence (OSINT)
  15. Security Orchestration, Automation, and Response (SOAR)
  16. Zero-Day
  17. Anti-Virus Software (AV)
  18. Logs
  19. Common Vulnerabilities & Exposures (CVE)
  20. Data Source
  21. Configuration Management Database (CMDB)
  22. Managed Detection and Response (MDR)
  23. Operational Security (OPSEC)
  24. Threat Intelligence
  25. Ransomware
  26. Security Operations Center (SOC)
  27. Endpoint
  28. Human Intelligence (HUMINT)
  29. Penetration Test
  30. Cyber Insurance
  31. Artificial Intelligence (AI)
  32. Digital Forensics and Incident Response (DFIR)
  33. Multi Factor Authentication (MFA)
  34. Continuous Risk Scanning (CRS)
  35. End-Point Detection and Response (EDR)
  36. Extended Detection and Response (XDR)
  37. Advanced Persistent Threat (APT)
  38. Security Information and Event Management (SIEM)
  39. Command and Control (C2)
  40. ATT&CK
  41. CIA Triad
  42. Malware
  43. Cybersecurity