Cyber RiskAssessmentResilienceResiliencyMissionModelModelingandSimulationCyberVulnerabilityCyberPostureCyberResiliencyMissionImpactKeyCyberTerrainMitigationsRedTeamSoftwareAssuranceAttackThreat/Path/ContextDemonstratedMissionEssentialFunctionsSystemModelHypothesizedMaliciousInsiderSupplyChainKillchainMOEEmulationCyberThreatFOUOCyber RiskAssessmentResilienceResiliencyMissionModelModelingandSimulationCyberVulnerabilityCyberPostureCyberResiliencyMissionImpactKeyCyberTerrainMitigationsRedTeamSoftwareAssuranceAttackThreat/Path/ContextDemonstratedMissionEssentialFunctionsSystemModelHypothesizedMaliciousInsiderSupplyChainKillchainMOEEmulationCyberThreatFOUO

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Cyber Risk Assessment
  2. Resilience
  3. Resiliency
  4. Mission Model
  5. Modeling and Simulation
  6. Cyber Vulnerability
  7. Cyber Posture
  8. Cyber Resiliency
  9. Mission Impact
  10. Key Cyber Terrain
  11. Mitigations
  12. Red Team
  13. Software Assurance
  14. Attack Threat/Path/Context
  15. Demonstrated
  16. Mission Essential Functions
  17. System Model
  18. Hypothesized
  19. Malicious Insider
  20. Supply Chain
  21. Killchain
  22. MOE
  23. Emulation
  24. Cyber Threat
  25. FOUO