MissionEssentialFunctionsKillchainCyberResiliencyModelingandSimulationAttackThreat/Path/ContextCyber RiskAssessmentSupplyChainMissionModelFOUOSystemModelRedTeamMaliciousInsiderMOEMissionImpactMitigationsResilienceKeyCyberTerrainHypothesizedCyberThreatCyberVulnerabilityEmulationResiliencyDemonstratedSoftwareAssuranceCyberPostureMissionEssentialFunctionsKillchainCyberResiliencyModelingandSimulationAttackThreat/Path/ContextCyber RiskAssessmentSupplyChainMissionModelFOUOSystemModelRedTeamMaliciousInsiderMOEMissionImpactMitigationsResilienceKeyCyberTerrainHypothesizedCyberThreatCyberVulnerabilityEmulationResiliencyDemonstratedSoftwareAssuranceCyberPosture

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Mission Essential Functions
  2. Killchain
  3. Cyber Resiliency
  4. Modeling and Simulation
  5. Attack Threat/Path/Context
  6. Cyber Risk Assessment
  7. Supply Chain
  8. Mission Model
  9. FOUO
  10. System Model
  11. Red Team
  12. Malicious Insider
  13. MOE
  14. Mission Impact
  15. Mitigations
  16. Resilience
  17. Key Cyber Terrain
  18. Hypothesized
  19. Cyber Threat
  20. Cyber Vulnerability
  21. Emulation
  22. Resiliency
  23. Demonstrated
  24. Software Assurance
  25. Cyber Posture