HypothesizedEmulationRedTeamModelingandSimulationMaliciousInsiderMissionEssentialFunctionsMissionModelKillchainAttackThreat/Path/ContextMOECyberResiliencyCyberPostureDemonstratedResiliencyCyberVulnerabilitySystemModelMissionImpactSupplyChainSoftwareAssuranceCyber RiskAssessmentCyberThreatFOUOResilienceMitigationsKeyCyberTerrainHypothesizedEmulationRedTeamModelingandSimulationMaliciousInsiderMissionEssentialFunctionsMissionModelKillchainAttackThreat/Path/ContextMOECyberResiliencyCyberPostureDemonstratedResiliencyCyberVulnerabilitySystemModelMissionImpactSupplyChainSoftwareAssuranceCyber RiskAssessmentCyberThreatFOUOResilienceMitigationsKeyCyberTerrain

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Hypothesized
  2. Emulation
  3. Red Team
  4. Modeling and Simulation
  5. Malicious Insider
  6. Mission Essential Functions
  7. Mission Model
  8. Killchain
  9. Attack Threat/Path/Context
  10. MOE
  11. Cyber Resiliency
  12. Cyber Posture
  13. Demonstrated
  14. Resiliency
  15. Cyber Vulnerability
  16. System Model
  17. Mission Impact
  18. Supply Chain
  19. Software Assurance
  20. Cyber Risk Assessment
  21. Cyber Threat
  22. FOUO
  23. Resilience
  24. Mitigations
  25. Key Cyber Terrain