Software Assurance Measures of Effectiveness Malicious Insider Mitigations System Model Mission Impact Cyber Resiliency Cyber Vulnerability Emulation Key Cyber Terrain Mission Essential Functions Russia Resilience Cyber Threat Supply Chain Red Team Modeling and Simulation Hypothesized Cyber Risk Assessment Information Assurance Mission Model Killchain Resiliency Cyber Posture Software Assurance Measures of Effectiveness Malicious Insider Mitigations System Model Mission Impact Cyber Resiliency Cyber Vulnerability Emulation Key Cyber Terrain Mission Essential Functions Russia Resilience Cyber Threat Supply Chain Red Team Modeling and Simulation Hypothesized Cyber Risk Assessment Information Assurance Mission Model Killchain Resiliency Cyber Posture
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Software Assurance
Measures of Effectiveness
Malicious Insider
Mitigations
System Model
Mission Impact
Cyber Resiliency
Cyber Vulnerability
Emulation
Key Cyber Terrain
Mission Essential Functions
Russia
Resilience
Cyber Threat
Supply Chain
Red Team
Modeling and Simulation
Hypothesized
Cyber Risk Assessment
Information Assurance
Mission Model
Killchain
Resiliency
Cyber Posture