Threat Hunting SIM Swapping IoT Threat Intelligence PII Spear Phishing Two-factor Authentification Digital Transformation Insider Threat Firewall Decryption Spam Greylist Remote Desktop Protocol (RDP) Cybersecurity Honeypot Critical Infrastructure Sandbox(ing) Zero- day Exploit Secure Socket Layer (SSL) Indicators of Compromise (IOC) Cryptojacking CAPTCHA Hacker Identity Identity and Access Management (IAM) Drive By Download Attack Phishing Risktool White Hat - Black Hat Data Integrity Fileless Malware Malvertising Spyware Rootkit Clientless Digital Forensics Spoofing Pen Testing BYOL BYOD Adware Vulnerability Clickjacking Brute Force Attack Encryption Exploit Data Breach Scareware Man-in- theMiddle Attack Two-step Authentification Botnet Fast Identity Online (FIDO) Virus Whitelist, Allowlist Ransomware Backdoor Keylogger Banker Trojan Threat Assessment Process Hollowing WAF Patch Business Continuity Plan In-line Network Device Parental Controls SECaaS VPN DDoS Authentication Dark Web Social Engineering Data LossPrevention (DLP) Threat Hunting SIM Swapping IoT Threat Intelligence PII Spear Phishing Two-factor Authentification Digital Transformation Insider Threat Firewall Decryption Spam Greylist Remote Desktop Protocol (RDP) Cybersecurity Honeypot Critical Infrastructure Sandbox(ing) Zero- day Exploit Secure Socket Layer (SSL) Indicators of Compromise (IOC) Cryptojacking CAPTCHA Hacker Identity Identity and Access Management (IAM) Drive By Download Attack Phishing Risktool White Hat - Black Hat Data Integrity Fileless Malware Malvertising Spyware Rootkit Clientless Digital Forensics Spoofing Pen Testing BYOL BYOD Adware Vulnerability Clickjacking Brute Force Attack Encryption Exploit Data Breach Scareware Man-in- theMiddle Attack Two-step Authentification Botnet Fast Identity Online (FIDO) Virus Whitelist, Allowlist Ransomware Backdoor Keylogger Banker Trojan Threat Assessment Process Hollowing WAF Patch Business Continuity Plan In-line Network Device Parental Controls SECaaS VPN DDoS Authentication Dark Web Social Engineering Data LossPrevention (DLP)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Hunting
SIM Swapping
IoT
Threat Intelligence
PII
Spear Phishing
Two-factor Authentification
Digital Transformation
Insider Threat
Firewall
Decryption
Spam
Greylist
Remote Desktop Protocol (RDP)
Cybersecurity
Honeypot
Critical Infrastructure
Sandbox(ing)
Zero-day Exploit
Secure Socket Layer (SSL)
Indicators of Compromise (IOC)
Cryptojacking
CAPTCHA
Hacker
Identity
Identity and Access Management (IAM)
Drive By Download Attack
Phishing
Risktool
White Hat - Black Hat
Data Integrity
Fileless Malware
Malvertising
Spyware
Rootkit
Clientless
Digital Forensics
Spoofing
Pen Testing
BYOL
BYOD
Adware
Vulnerability
Clickjacking
Brute Force Attack
Encryption
Exploit
Data Breach
Scareware
Man-in-theMiddle Attack
Two-step Authentification
Botnet
Fast Identity Online (FIDO)
Virus
Whitelist, Allowlist
Ransomware
Backdoor
Keylogger
Banker Trojan
Threat Assessment
Process Hollowing
WAF
Patch
Business Continuity Plan
In-line Network Device
Parental Controls
SECaaS
VPN
DDoS
Authentication
Dark Web
Social Engineering
Data LossPrevention (DLP)