Digital Forensics Hacker In-line Network Device Ransomware Pen Testing Social Engineering Threat Assessment Clickjacking Critical Infrastructure IoT Drive By Download Attack Process Hollowing BYOL Honeypot Man-in- theMiddle Attack Sandbox(ing) Zero- day Exploit Identity Botnet Authentication Risktool Exploit Malvertising Indicators of Compromise (IOC) Banker Trojan White Hat - Black Hat Decryption Two-step Authentification Dark Web Fast Identity Online (FIDO) VPN Rootkit Spam Threat Intelligence Greylist Clientless Secure Socket Layer (SSL) Insider Threat Patch Whitelist, Allowlist DDoS Adware Vulnerability SIM Swapping Fileless Malware PII Keylogger Encryption Brute Force Attack Backdoor Digital Transformation Firewall Phishing Business Continuity Plan Parental Controls Data LossPrevention (DLP) Scareware Data Breach CAPTCHA Spear Phishing WAF Spoofing Threat Hunting Two-factor Authentification Cybersecurity Remote Desktop Protocol (RDP) Cryptojacking Virus Spyware Data Integrity Identity and Access Management (IAM) BYOD SECaaS Digital Forensics Hacker In-line Network Device Ransomware Pen Testing Social Engineering Threat Assessment Clickjacking Critical Infrastructure IoT Drive By Download Attack Process Hollowing BYOL Honeypot Man-in- theMiddle Attack Sandbox(ing) Zero- day Exploit Identity Botnet Authentication Risktool Exploit Malvertising Indicators of Compromise (IOC) Banker Trojan White Hat - Black Hat Decryption Two-step Authentification Dark Web Fast Identity Online (FIDO) VPN Rootkit Spam Threat Intelligence Greylist Clientless Secure Socket Layer (SSL) Insider Threat Patch Whitelist, Allowlist DDoS Adware Vulnerability SIM Swapping Fileless Malware PII Keylogger Encryption Brute Force Attack Backdoor Digital Transformation Firewall Phishing Business Continuity Plan Parental Controls Data LossPrevention (DLP) Scareware Data Breach CAPTCHA Spear Phishing WAF Spoofing Threat Hunting Two-factor Authentification Cybersecurity Remote Desktop Protocol (RDP) Cryptojacking Virus Spyware Data Integrity Identity and Access Management (IAM) BYOD SECaaS
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Digital Forensics
Hacker
In-line Network Device
Ransomware
Pen Testing
Social Engineering
Threat Assessment
Clickjacking
Critical Infrastructure
IoT
Drive By Download Attack
Process Hollowing
BYOL
Honeypot
Man-in-theMiddle Attack
Sandbox(ing)
Zero-day Exploit
Identity
Botnet
Authentication
Risktool
Exploit
Malvertising
Indicators of Compromise (IOC)
Banker Trojan
White Hat - Black Hat
Decryption
Two-step Authentification
Dark Web
Fast Identity Online (FIDO)
VPN
Rootkit
Spam
Threat Intelligence
Greylist
Clientless
Secure Socket Layer (SSL)
Insider Threat
Patch
Whitelist, Allowlist
DDoS
Adware
Vulnerability
SIM Swapping
Fileless Malware
PII
Keylogger
Encryption
Brute Force Attack
Backdoor
Digital Transformation
Firewall
Phishing
Business Continuity Plan
Parental Controls
Data LossPrevention (DLP)
Scareware
Data Breach
CAPTCHA
Spear Phishing
WAF
Spoofing
Threat Hunting
Two-factor Authentification
Cybersecurity
Remote Desktop Protocol (RDP)
Cryptojacking
Virus
Spyware
Data Integrity
Identity and Access Management (IAM)
BYOD
SECaaS