RiskOperationalSecurity(OPSEC)CommandandControl(C2)HumanIntelligence(HUMINT)ManagedDetectionandResponse(MDR)DigitalForensicsand IncidentResponse(DFIR)ContinuousRiskScanning(CRS)ATT&CKAdvancedPersistentThreat(APT)LegacyEndpointInternetof Things(IoT)CommonVulnerabilities& Exposures(CVE)ThreatIntelligenceLogsAnti-VirusSoftware(AV)End-PointDetectionandResponse(EDR)SecurityInformationand EventManagement(SIEM)VulnerabilityRansomwareDefensein DepthExploitMitigateMean TimetoRemediate(MTTR)SecurityOperationsCenter(SOC)IncidentMulti FactorAuthentication(MFA)Tactics,Techniques,andProcedures(TTP)PenetrationTestMalwareSecurityOrchestration,Automation,and Response(SOAR)Indicator ofCompromise(IOC)CybersecurityDataSourceExtendedDetectionandResponse(XDR)ConfigurationManagementDatabase(CMDB)ArtificialIntelligence(AI)MachineLearningOpenSourceIntelligence(OSINT)MeanTime toDetect(MTTD)Zero-DayCIATriadCyberInsuranceRiskOperationalSecurity(OPSEC)CommandandControl(C2)HumanIntelligence(HUMINT)ManagedDetectionandResponse(MDR)DigitalForensicsand IncidentResponse(DFIR)ContinuousRiskScanning(CRS)ATT&CKAdvancedPersistentThreat(APT)LegacyEndpointInternetof Things(IoT)CommonVulnerabilities& Exposures(CVE)ThreatIntelligenceLogsAnti-VirusSoftware(AV)End-PointDetectionandResponse(EDR)SecurityInformationand EventManagement(SIEM)VulnerabilityRansomwareDefensein DepthExploitMitigateMean TimetoRemediate(MTTR)SecurityOperationsCenter(SOC)IncidentMulti FactorAuthentication(MFA)Tactics,Techniques,andProcedures(TTP)PenetrationTestMalwareSecurityOrchestration,Automation,and Response(SOAR)Indicator ofCompromise(IOC)CybersecurityDataSourceExtendedDetectionandResponse(XDR)ConfigurationManagementDatabase(CMDB)ArtificialIntelligence(AI)MachineLearningOpenSourceIntelligence(OSINT)MeanTime toDetect(MTTD)Zero-DayCIATriadCyberInsurance

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. Risk
  2. Operational Security (OPSEC)
  3. Command and Control (C2)
  4. Human Intelligence (HUMINT)
  5. Managed Detection and Response (MDR)
  6. Digital Forensics and Incident Response (DFIR)
  7. Continuous Risk Scanning (CRS)
  8. ATT&CK
  9. Advanced Persistent Threat (APT)
  10. Legacy
  11. Endpoint
  12. Internet of Things (IoT)
  13. Common Vulnerabilities & Exposures (CVE)
  14. Threat Intelligence
  15. Logs
  16. Anti-Virus Software (AV)
  17. End-Point Detection and Response (EDR)
  18. Security Information and Event Management (SIEM)
  19. Vulnerability
  20. Ransomware
  21. Defense in Depth
  22. Exploit
  23. Mitigate
  24. Mean Time to Remediate (MTTR)
  25. Security Operations Center (SOC)
  26. Incident
  27. Multi Factor Authentication (MFA)
  28. Tactics, Techniques, and Procedures (TTP)
  29. Penetration Test
  30. Malware
  31. Security Orchestration, Automation, and Response (SOAR)
  32. Indicator of Compromise (IOC)
  33. Cybersecurity
  34. Data Source
  35. Extended Detection and Response (XDR)
  36. Configuration Management Database (CMDB)
  37. Artificial Intelligence (AI)
  38. Machine Learning
  39. Open Source Intelligence (OSINT)
  40. Mean Time to Detect (MTTD)
  41. Zero-Day
  42. CIA Triad
  43. Cyber Insurance