Encryption Spyware Blocklist Cyber Trojan CTI SIEM IDS Anti- Malware DDOS BYOD COTS Adware MITM Virus Firewall Spear Phishing Phishing Threat PII Cryptojacking Decryption DNS SaaS Bruteforce Authentication BIA Scareware 2FA Malvertising Keylogger SOAR DLP Honeypot WAF Insider Threat Anti- Phishing Ransomware MFA Antivirus Sandbox Clickjacking Whitelist Identity Blacklist Greylist Botnet Vulnerability VPN Backdoor Zero Trust Technology Endpoint Security IAM Darkweb Fileless Malware Spoofing Sim Swapping Exploit Malware APT Risk IOC Assessment Forensics RDP Incident Nework Inline Device CSOC Hacker COOP Attack Vector IPS MiTRE Sniffing IoT CAPTCHA Rootkit SSL Patching Safeguard Breach EDR PHI Social Engineering Drive By Download 0- Day SPAM Encryption Spyware Blocklist Cyber Trojan CTI SIEM IDS Anti- Malware DDOS BYOD COTS Adware MITM Virus Firewall Spear Phishing Phishing Threat PII Cryptojacking Decryption DNS SaaS Bruteforce Authentication BIA Scareware 2FA Malvertising Keylogger SOAR DLP Honeypot WAF Insider Threat Anti- Phishing Ransomware MFA Antivirus Sandbox Clickjacking Whitelist Identity Blacklist Greylist Botnet Vulnerability VPN Backdoor Zero Trust Technology Endpoint Security IAM Darkweb Fileless Malware Spoofing Sim Swapping Exploit Malware APT Risk IOC Assessment Forensics RDP Incident Nework Inline Device CSOC Hacker COOP Attack Vector IPS MiTRE Sniffing IoT CAPTCHA Rootkit SSL Patching Safeguard Breach EDR PHI Social Engineering Drive By Download 0- Day SPAM
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Encryption
Spyware
Blocklist
Cyber
Trojan
CTI
SIEM
IDS
Anti-Malware
DDOS
BYOD
COTS
Adware
MITM
Virus
Firewall
Spear Phishing
Phishing
Threat
PII
Cryptojacking
Decryption
DNS
SaaS
Bruteforce
Authentication
BIA
Scareware
2FA
Malvertising
Keylogger
SOAR
DLP
Honeypot
WAF
Insider Threat
Anti-Phishing
Ransomware
MFA
Antivirus
Sandbox
Clickjacking
Whitelist
Identity
Blacklist
Greylist
Botnet
Vulnerability
VPN
Backdoor
Zero Trust
Technology
Endpoint
Security
IAM
Darkweb
Fileless Malware
Spoofing
Sim Swapping
Exploit
Malware
APT
Risk
IOC
Assessment
Forensics
RDP
Incident
Nework
Inline Device
CSOC
Hacker
COOP
Attack Vector
IPS
MiTRE
Sniffing
IoT
CAPTCHA
Rootkit
SSL
Patching
Safeguard
Breach
EDR
PHI
Social Engineering
Drive By Download
0-Day
SPAM