KeyCyberTerrainMaliciousInsiderMissionImpactSoftwareAssuranceCyberPostureMitigationsMissionEssentialFunctionsCyberVulnerabilityCyberThreatMissionModelModelingandSimulationRedTeamMOESystemModelAttackThreat/Path/ContextFOUOEmulationKillchainCyber RiskAssessmentCyberResiliencyDemonstratedHypothesizedSupplyChainResiliencyResilienceKeyCyberTerrainMaliciousInsiderMissionImpactSoftwareAssuranceCyberPostureMitigationsMissionEssentialFunctionsCyberVulnerabilityCyberThreatMissionModelModelingandSimulationRedTeamMOESystemModelAttackThreat/Path/ContextFOUOEmulationKillchainCyber RiskAssessmentCyberResiliencyDemonstratedHypothesizedSupplyChainResiliencyResilience

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Key Cyber Terrain
  2. Malicious Insider
  3. Mission Impact
  4. Software Assurance
  5. Cyber Posture
  6. Mitigations
  7. Mission Essential Functions
  8. Cyber Vulnerability
  9. Cyber Threat
  10. Mission Model
  11. Modeling and Simulation
  12. Red Team
  13. MOE
  14. System Model
  15. Attack Threat/Path/Context
  16. FOUO
  17. Emulation
  18. Killchain
  19. Cyber Risk Assessment
  20. Cyber Resiliency
  21. Demonstrated
  22. Hypothesized
  23. Supply Chain
  24. Resiliency
  25. Resilience