Cyber RiskAssessmentMOEEmulationCyberPostureMissionImpactMissionEssentialFunctionsResiliencySupplyChainKeyCyberTerrainCyberThreatDemonstratedFOUOCyberResiliencyHypothesizedMissionModelMitigationsAttackThreat/Path/ContextSystemModelMaliciousInsiderRedTeamSoftwareAssuranceModelingandSimulationKillchainResilienceCyberVulnerabilityCyber RiskAssessmentMOEEmulationCyberPostureMissionImpactMissionEssentialFunctionsResiliencySupplyChainKeyCyberTerrainCyberThreatDemonstratedFOUOCyberResiliencyHypothesizedMissionModelMitigationsAttackThreat/Path/ContextSystemModelMaliciousInsiderRedTeamSoftwareAssuranceModelingandSimulationKillchainResilienceCyberVulnerability

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Cyber Risk Assessment
  2. MOE
  3. Emulation
  4. Cyber Posture
  5. Mission Impact
  6. Mission Essential Functions
  7. Resiliency
  8. Supply Chain
  9. Key Cyber Terrain
  10. Cyber Threat
  11. Demonstrated
  12. FOUO
  13. Cyber Resiliency
  14. Hypothesized
  15. Mission Model
  16. Mitigations
  17. Attack Threat/Path/Context
  18. System Model
  19. Malicious Insider
  20. Red Team
  21. Software Assurance
  22. Modeling and Simulation
  23. Killchain
  24. Resilience
  25. Cyber Vulnerability