ATT&CKMeanTime toDetect(MTTD)PenetrationTestOpenSourceIntelligence(OSINT)OperationalSecurity(OPSEC)End-PointDetectionandResponse(EDR)DigitalForensicsand IncidentResponse(DFIR)RiskMalwareCIATriadThreatIntelligenceConfigurationManagementDatabase(CMDB)RansomwareMitigateSecurityInformationand EventManagement(SIEM)Zero-DayVulnerabilityMean TimetoRemediate(MTTR)CyberInsuranceExploitHumanIntelligence(HUMINT)ArtificialIntelligence(AI)MachineLearningLogsIndicator ofCompromise(IOC)SecurityOperationsCenter(SOC)AdvancedPersistentThreat(APT)CommandandControl(C2)ExtendedDetectionandResponse(XDR)Multi FactorAuthentication(MFA)IncidentLegacyInternetof Things(IoT)EndpointTactics,Techniques,andProcedures(TTP)Anti-VirusSoftware(AV)Defensein DepthManagedDetectionandResponse(MDR)CommonVulnerabilities& Exposures(CVE)CybersecurityDataSourceSecurityOrchestration,Automation,and Response(SOAR)ContinuousRiskScanning(CRS)ATT&CKMeanTime toDetect(MTTD)PenetrationTestOpenSourceIntelligence(OSINT)OperationalSecurity(OPSEC)End-PointDetectionandResponse(EDR)DigitalForensicsand IncidentResponse(DFIR)RiskMalwareCIATriadThreatIntelligenceConfigurationManagementDatabase(CMDB)RansomwareMitigateSecurityInformationand EventManagement(SIEM)Zero-DayVulnerabilityMean TimetoRemediate(MTTR)CyberInsuranceExploitHumanIntelligence(HUMINT)ArtificialIntelligence(AI)MachineLearningLogsIndicator ofCompromise(IOC)SecurityOperationsCenter(SOC)AdvancedPersistentThreat(APT)CommandandControl(C2)ExtendedDetectionandResponse(XDR)Multi FactorAuthentication(MFA)IncidentLegacyInternetof Things(IoT)EndpointTactics,Techniques,andProcedures(TTP)Anti-VirusSoftware(AV)Defensein DepthManagedDetectionandResponse(MDR)CommonVulnerabilities& Exposures(CVE)CybersecurityDataSourceSecurityOrchestration,Automation,and Response(SOAR)ContinuousRiskScanning(CRS)

Security 101 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  1. ATT&CK
  2. Mean Time to Detect (MTTD)
  3. Penetration Test
  4. Open Source Intelligence (OSINT)
  5. Operational Security (OPSEC)
  6. End-Point Detection and Response (EDR)
  7. Digital Forensics and Incident Response (DFIR)
  8. Risk
  9. Malware
  10. CIA Triad
  11. Threat Intelligence
  12. Configuration Management Database (CMDB)
  13. Ransomware
  14. Mitigate
  15. Security Information and Event Management (SIEM)
  16. Zero-Day
  17. Vulnerability
  18. Mean Time to Remediate (MTTR)
  19. Cyber Insurance
  20. Exploit
  21. Human Intelligence (HUMINT)
  22. Artificial Intelligence (AI)
  23. Machine Learning
  24. Logs
  25. Indicator of Compromise (IOC)
  26. Security Operations Center (SOC)
  27. Advanced Persistent Threat (APT)
  28. Command and Control (C2)
  29. Extended Detection and Response (XDR)
  30. Multi Factor Authentication (MFA)
  31. Incident
  32. Legacy
  33. Internet of Things (IoT)
  34. Endpoint
  35. Tactics, Techniques, and Procedures (TTP)
  36. Anti-Virus Software (AV)
  37. Defense in Depth
  38. Managed Detection and Response (MDR)
  39. Common Vulnerabilities & Exposures (CVE)
  40. Cybersecurity
  41. Data Source
  42. Security Orchestration, Automation, and Response (SOAR)
  43. Continuous Risk Scanning (CRS)