AttackThreat/Path/ContextMOEKillchainRedTeamCyberPostureKeyCyberTerrainModelingandSimulationCyberThreatMissionImpactCyberVulnerabilityMaliciousInsiderCyber RiskAssessmentSystemModelDemonstratedEmulationMissionEssentialFunctionsHypothesizedSupplyChainSoftwareAssuranceResilienceFOUOResiliencyMitigationsCyberResiliencyMissionModelAttackThreat/Path/ContextMOEKillchainRedTeamCyberPostureKeyCyberTerrainModelingandSimulationCyberThreatMissionImpactCyberVulnerabilityMaliciousInsiderCyber RiskAssessmentSystemModelDemonstratedEmulationMissionEssentialFunctionsHypothesizedSupplyChainSoftwareAssuranceResilienceFOUOResiliencyMitigationsCyberResiliencyMissionModel

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Attack Threat/Path/Context
  2. MOE
  3. Killchain
  4. Red Team
  5. Cyber Posture
  6. Key Cyber Terrain
  7. Modeling and Simulation
  8. Cyber Threat
  9. Mission Impact
  10. Cyber Vulnerability
  11. Malicious Insider
  12. Cyber Risk Assessment
  13. System Model
  14. Demonstrated
  15. Emulation
  16. Mission Essential Functions
  17. Hypothesized
  18. Supply Chain
  19. Software Assurance
  20. Resilience
  21. FOUO
  22. Resiliency
  23. Mitigations
  24. Cyber Resiliency
  25. Mission Model