(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
ATT&CK
Mean Time to Remediate (MTTR)
Command and Control (C2)
Tactics, Techniques, and Procedures (TTP)
CIA Triad
Mean Time to Detect (MTTD)
Exploit
Extended Detection and Response (XDR)
Indicator of Compromise (IOC)
Cyber Insurance
Digital Forensics and Incident Response (DFIR)
Malware
Threat Intelligence
Internet of Things (IoT)
Advanced Persistent Threat (APT)
Multi Factor Authentication (MFA)
Open Source Intelligence (OSINT)
Security Information and Event Management (SIEM)
Data Source
Continuous Risk Scanning (CRS)
Artificial Intelligence (AI)
Machine Learning
Zero-Day
Mitigate
Configuration Management Database (CMDB)
Operational Security (OPSEC)
Legacy
Vulnerability
Endpoint
Human Intelligence (HUMINT)
Ransomware
Managed Detection and Response (MDR)
Penetration Test
End-Point Detection and Response (EDR)
Common Vulnerabilities & Exposures (CVE)
Security Orchestration, Automation, and Response (SOAR)