Network Threat Hunting Cayosoft Big 3 Initiative Deuce Strategic Wolfson Threat Hunting Big 3 Active Directory AI Migrate Jackal Infrastructure Ping Pong IEEE IEEE Remediation Active Directory Flash Blades Deuce Network Design Cyber Haven Migrate Q4 Supportable Supportable Cayosoft Segmentation Data Classification Initiative Q4 Flash Blades Remediation Jackal Wolfson Infrastructure Design CyberHaven Splunk AI Leadership Ping Pong Segmentation Data Classification Splunk Strategic Network Threat Hunting Cayosoft Big 3 Initiative Deuce Strategic Wolfson Threat Hunting Big 3 Active Directory AI Migrate Jackal Infrastructure Ping Pong IEEE IEEE Remediation Active Directory Flash Blades Deuce Network Design Cyber Haven Migrate Q4 Supportable Supportable Cayosoft Segmentation Data Classification Initiative Q4 Flash Blades Remediation Jackal Wolfson Infrastructure Design CyberHaven Splunk AI Leadership Ping Pong Segmentation Data Classification Splunk Strategic
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Network
Threat Hunting
Cayosoft
Big 3
Initiative
Deuce
Strategic
Wolfson
Threat Hunting
Big 3
Active Directory
AI
Migrate
Jackal
Infrastructure
Ping Pong
IEEE
IEEE
Remediation
Active Directory
Flash Blades
Deuce
Network
Design
Cyber Haven
Migrate
Q4
Supportable
Supportable
Cayosoft
Segmentation
Data Classification
Initiative
Q4
Flash Blades
Remediation
Jackal
Wolfson
Infrastructure
Design
CyberHaven
Splunk
AI
Leadership
Ping Pong
Segmentation
Data Classification
Splunk
Strategic