HypothesizedModelingandSimulationCyberThreatCyberVulnerabilityAttackThreat/Path/ContextCyberResiliencyResilienceMOEResiliencyCyber RiskAssessmentMitigationsSoftwareAssuranceCyberPostureMissionImpactSystemModelEmulationDemonstratedMaliciousInsiderRedTeamMissionEssentialFunctionsMissionModelFOUOKeyCyberTerrainKillchainSupplyChainHypothesizedModelingandSimulationCyberThreatCyberVulnerabilityAttackThreat/Path/ContextCyberResiliencyResilienceMOEResiliencyCyber RiskAssessmentMitigationsSoftwareAssuranceCyberPostureMissionImpactSystemModelEmulationDemonstratedMaliciousInsiderRedTeamMissionEssentialFunctionsMissionModelFOUOKeyCyberTerrainKillchainSupplyChain

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Hypothesized
  2. Modeling and Simulation
  3. Cyber Threat
  4. Cyber Vulnerability
  5. Attack Threat/Path/Context
  6. Cyber Resiliency
  7. Resilience
  8. MOE
  9. Resiliency
  10. Cyber Risk Assessment
  11. Mitigations
  12. Software Assurance
  13. Cyber Posture
  14. Mission Impact
  15. System Model
  16. Emulation
  17. Demonstrated
  18. Malicious Insider
  19. Red Team
  20. Mission Essential Functions
  21. Mission Model
  22. FOUO
  23. Key Cyber Terrain
  24. Killchain
  25. Supply Chain