SupplyChainMitigationsCyberVulnerabilityEmulationResilienceDemonstratedCyberResiliencyMOEKillchainCyberPostureSystemModelCyber RiskAssessmentSoftwareAssuranceMissionEssentialFunctionsMaliciousInsiderFOUORedTeamAttackThreat/Path/ContextCyberThreatMissionImpactResiliencyKeyCyberTerrainHypothesizedMissionModelModelingandSimulationSupplyChainMitigationsCyberVulnerabilityEmulationResilienceDemonstratedCyberResiliencyMOEKillchainCyberPostureSystemModelCyber RiskAssessmentSoftwareAssuranceMissionEssentialFunctionsMaliciousInsiderFOUORedTeamAttackThreat/Path/ContextCyberThreatMissionImpactResiliencyKeyCyberTerrainHypothesizedMissionModelModelingandSimulation

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Supply Chain
  2. Mitigations
  3. Cyber Vulnerability
  4. Emulation
  5. Resilience
  6. Demonstrated
  7. Cyber Resiliency
  8. MOE
  9. Killchain
  10. Cyber Posture
  11. System Model
  12. Cyber Risk Assessment
  13. Software Assurance
  14. Mission Essential Functions
  15. Malicious Insider
  16. FOUO
  17. Red Team
  18. Attack Threat/Path/Context
  19. Cyber Threat
  20. Mission Impact
  21. Resiliency
  22. Key Cyber Terrain
  23. Hypothesized
  24. Mission Model
  25. Modeling and Simulation