Mitigate Tactics, Techniques, and Procedures (TTP) Defense in Depth Risk Indicator of Compromise (IOC) Legacy Mean Time to Detect (MTTD) Vulnerability Mean Time to Remediate (MTTR) Exploit Machine Learning Internet of Things (IoT) Incident Open Source Intelligence (OSINT) Security Orchestration, Automation, and Response (SOAR) Zero- Day Anti-Virus Software (AV) Logs Common Vulnerabilities & Exposures (CVE) Data Source Configuration Management Database (CMDB) Managed Detection and Response (MDR) Operational Security (OPSEC) Threat Intelligence Ransomware Security Operations Center (SOC) Endpoint Human Intelligence (HUMINT) Penetration Test Cyber Insurance Artificial Intelligence (AI) Digital Forensics and Incident Response (DFIR) Multi Factor Authentication (MFA) Continuous Risk Scanning (CRS) End-Point Detection and Response (EDR) Extended Detection and Response (XDR) Advanced Persistent Threat (APT) Security Information and Event Management (SIEM) Command and Control (C2) ATT&CK CIA Triad Malware Cybersecurity Mitigate Tactics, Techniques, and Procedures (TTP) Defense in Depth Risk Indicator of Compromise (IOC) Legacy Mean Time to Detect (MTTD) Vulnerability Mean Time to Remediate (MTTR) Exploit Machine Learning Internet of Things (IoT) Incident Open Source Intelligence (OSINT) Security Orchestration, Automation, and Response (SOAR) Zero- Day Anti-Virus Software (AV) Logs Common Vulnerabilities & Exposures (CVE) Data Source Configuration Management Database (CMDB) Managed Detection and Response (MDR) Operational Security (OPSEC) Threat Intelligence Ransomware Security Operations Center (SOC) Endpoint Human Intelligence (HUMINT) Penetration Test Cyber Insurance Artificial Intelligence (AI) Digital Forensics and Incident Response (DFIR) Multi Factor Authentication (MFA) Continuous Risk Scanning (CRS) End-Point Detection and Response (EDR) Extended Detection and Response (XDR) Advanced Persistent Threat (APT) Security Information and Event Management (SIEM) Command and Control (C2) ATT&CK CIA Triad Malware Cybersecurity
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Mitigate
Tactics, Techniques, and Procedures (TTP)
Defense in Depth
Risk
Indicator of Compromise (IOC)
Legacy
Mean Time to Detect (MTTD)
Vulnerability
Mean Time to Remediate (MTTR)
Exploit
Machine Learning
Internet of Things (IoT)
Incident
Open Source Intelligence (OSINT)
Security Orchestration, Automation, and Response (SOAR)
Zero-Day
Anti-Virus Software (AV)
Logs
Common Vulnerabilities & Exposures (CVE)
Data Source
Configuration Management Database (CMDB)
Managed Detection and Response (MDR)
Operational Security (OPSEC)
Threat Intelligence
Ransomware
Security Operations Center (SOC)
Endpoint
Human Intelligence (HUMINT)
Penetration Test
Cyber Insurance
Artificial Intelligence (AI)
Digital Forensics and Incident Response (DFIR)
Multi Factor Authentication (MFA)
Continuous Risk Scanning (CRS)
End-Point Detection and Response (EDR)
Extended Detection and Response (XDR)
Advanced Persistent Threat (APT)
Security Information and Event Management (SIEM)
Command and Control (C2)
ATT&CK
CIA Triad
Malware
Cybersecurity