ARM 32- bit Full Disclosure Malware Embedded Device Best Practice It's on my radar Kernel Cyber Bullet 0- Day Follow Up Touch Base The Ask Value Add Offensive x86 Take it Offline Encryption Synergy Deep Dive Circle Back Agile Scalable Modem Game Plan Buffer Overflow Next Slide Please Linux PowerPC (PPC) Buy- In Hard Stop Strategic Action Item Leverage Alignment Results Driven Code Execution Terminal Emulation Quantum Computing ARM 32- bit Full Disclosure Malware Embedded Device Best Practice It's on my radar Kernel Cyber Bullet 0- Day Follow Up Touch Base The Ask Value Add Offensive x86 Take it Offline Encryption Synergy Deep Dive Circle Back Agile Scalable Modem Game Plan Buffer Overflow Next Slide Please Linux PowerPC (PPC) Buy- In Hard Stop Strategic Action Item Leverage Alignment Results Driven Code Execution Terminal Emulation Quantum Computing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ARM
32-bit
Full Disclosure
Malware
Embedded Device
Best Practice
It's on my radar
Kernel
Cyber Bullet
0-Day
Follow Up
Touch Base
The Ask
Value Add
Offensive
x86
Take it Offline
Encryption
Synergy
Deep Dive
Circle Back
Agile
Scalable
Modem
Game Plan
Buffer Overflow
Next Slide Please
Linux
PowerPC (PPC)
Buy-In
Hard Stop
Strategic
Action Item
Leverage
Alignment
Results Driven
Code Execution
Terminal
Emulation
Quantum Computing