FOUOSupplyChainCyberVulnerabilitySoftwareAssuranceCyberThreatSystemModelAttackThreat/Path/ContextMOEMissionEssentialFunctionsMaliciousInsiderMissionImpactResiliencyCyber RiskAssessmentMissionModelCyberResiliencyEmulationResilienceRedTeamKillchainModelingandSimulationHypothesizedCyberPostureDemonstratedMitigationsKeyCyberTerrainFOUOSupplyChainCyberVulnerabilitySoftwareAssuranceCyberThreatSystemModelAttackThreat/Path/ContextMOEMissionEssentialFunctionsMaliciousInsiderMissionImpactResiliencyCyber RiskAssessmentMissionModelCyberResiliencyEmulationResilienceRedTeamKillchainModelingandSimulationHypothesizedCyberPostureDemonstratedMitigationsKeyCyberTerrain

Briefing Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. FOUO
  2. Supply Chain
  3. Cyber Vulnerability
  4. Software Assurance
  5. Cyber Threat
  6. System Model
  7. Attack Threat/Path/Context
  8. MOE
  9. Mission Essential Functions
  10. Malicious Insider
  11. Mission Impact
  12. Resiliency
  13. Cyber Risk Assessment
  14. Mission Model
  15. Cyber Resiliency
  16. Emulation
  17. Resilience
  18. Red Team
  19. Killchain
  20. Modeling and Simulation
  21. Hypothesized
  22. Cyber Posture
  23. Demonstrated
  24. Mitigations
  25. Key Cyber Terrain