ThreatIntelligenceExtendedDetectionandResponse(XDR)HumanIntelligence(HUMINT)Internetof Things(IoT)MalwareDataSourceSecurityOrchestration,Automation,and Response(SOAR)MeanTime toDetect(MTTD)Zero-DayATT&CKManagedDetectionandResponse(MDR)Multi FactorAuthentication(MFA)Indicator ofCompromise(IOC)CommandandControl(C2)LegacyPenetrationTestOpenSourceIntelligence(OSINT)ConfigurationManagementDatabase(CMDB)CIATriadEnd-PointDetectionandResponse(EDR)DigitalForensicsand IncidentResponse(DFIR)LogsSecurityOperationsCenter(SOC)Defensein DepthCyberInsuranceSecurityInformationand EventManagement(SIEM)CommonVulnerabilities& Exposures(CVE)Anti-VirusSoftware(AV)AdvancedPersistentThreat(APT)VulnerabilityMachineLearningEndpointTactics,Techniques,andProcedures(TTP)ContinuousRiskScanning(CRS)ExploitOperationalSecurity(OPSEC)RiskMitigateCybersecurityIncidentMean TimetoRemediate(MTTR)RansomwareArtificialIntelligence(AI)ThreatIntelligenceExtendedDetectionandResponse(XDR)HumanIntelligence(HUMINT)Internetof Things(IoT)MalwareDataSourceSecurityOrchestration,Automation,and Response(SOAR)MeanTime toDetect(MTTD)Zero-DayATT&CKManagedDetectionandResponse(MDR)Multi FactorAuthentication(MFA)Indicator ofCompromise(IOC)CommandandControl(C2)LegacyPenetrationTestOpenSourceIntelligence(OSINT)ConfigurationManagementDatabase(CMDB)CIATriadEnd-PointDetectionandResponse(EDR)DigitalForensicsand IncidentResponse(DFIR)LogsSecurityOperationsCenter(SOC)Defensein DepthCyberInsuranceSecurityInformationand EventManagement(SIEM)CommonVulnerabilities& Exposures(CVE)Anti-VirusSoftware(AV)AdvancedPersistentThreat(APT)VulnerabilityMachineLearningEndpointTactics,Techniques,andProcedures(TTP)ContinuousRiskScanning(CRS)ExploitOperationalSecurity(OPSEC)RiskMitigateCybersecurityIncidentMean TimetoRemediate(MTTR)RansomwareArtificialIntelligence(AI)

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. Threat Intelligence
  2. Extended Detection and Response (XDR)
  3. Human Intelligence (HUMINT)
  4. Internet of Things (IoT)
  5. Malware
  6. Data Source
  7. Security Orchestration, Automation, and Response (SOAR)
  8. Mean Time to Detect (MTTD)
  9. Zero-Day
  10. ATT&CK
  11. Managed Detection and Response (MDR)
  12. Multi Factor Authentication (MFA)
  13. Indicator of Compromise (IOC)
  14. Command and Control (C2)
  15. Legacy
  16. Penetration Test
  17. Open Source Intelligence (OSINT)
  18. Configuration Management Database (CMDB)
  19. CIA Triad
  20. End-Point Detection and Response (EDR)
  21. Digital Forensics and Incident Response (DFIR)
  22. Logs
  23. Security Operations Center (SOC)
  24. Defense in Depth
  25. Cyber Insurance
  26. Security Information and Event Management (SIEM)
  27. Common Vulnerabilities & Exposures (CVE)
  28. Anti-Virus Software (AV)
  29. Advanced Persistent Threat (APT)
  30. Vulnerability
  31. Machine Learning
  32. Endpoint
  33. Tactics, Techniques, and Procedures (TTP)
  34. Continuous Risk Scanning (CRS)
  35. Exploit
  36. Operational Security (OPSEC)
  37. Risk
  38. Mitigate
  39. Cybersecurity
  40. Incident
  41. Mean Time to Remediate (MTTR)
  42. Ransomware
  43. Artificial Intelligence (AI)