IPSMFAOperatingSystemsRansomware"I'llescalatethis"CCDCOECompetentAuthorityEncryption"I'lllookinto it"PhishingExploitAWSCNIMITREATT&CKTeamsZeroDayRiskAssessmentRedTeamingPenetrationTestingXDRSOARAnti-MoneyLaunderingFirewallBEC"It'sprobablya falsepositive"BrowserCPUGDPRIPSPatchingFree!Zero-TrustComplianceSIEMRiskAssessmentDDoSMalwareCRMWebsite"It'sworkingon mymachine"APIIAMAdvancedForensicsFormatRAMEDRIDSIncidentResponseCCPAVulnerabilityIPSMFAOperatingSystemsRansomware"I'llescalatethis"CCDCOECompetentAuthorityEncryption"I'lllookinto it"PhishingExploitAWSCNIMITREATT&CKTeamsZeroDayRiskAssessmentRedTeamingPenetrationTestingXDRSOARAnti-MoneyLaunderingFirewallBEC"It'sprobablya falsepositive"BrowserCPUGDPRIPSPatchingFree!Zero-TrustComplianceSIEMRiskAssessmentDDoSMalwareCRMWebsite"It'sworkingon mymachine"APIIAMAdvancedForensicsFormatRAMEDRIDSIncidentResponseCCPAVulnerability

Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. IPS
  2. MFA
  3. Operating Systems
  4. Ransomware
  5. "I'll escalate this"
  6. CCDCOE
  7. Competent Authority
  8. Encryption
  9. "I'll look into it"
  10. Phishing
  11. Exploit
  12. AWS
  13. CNI
  14. MITRE ATT&CK
  15. Teams
  16. Zero Day
  17. Risk Assessment
  18. Red Teaming
  19. Penetration Testing
  20. XDR
  21. SOAR
  22. Anti-Money Laundering
  23. Firewall
  24. BEC
  25. "It's probably a false positive"
  26. Browser
  27. CPU
  28. GDPR
  29. IPS
  30. Patching
  31. Free!
  32. Zero-Trust
  33. Compliance
  34. SIEM
  35. Risk Assessment
  36. DDoS
  37. Malware
  38. CRM
  39. Website
  40. "It's working on my machine"
  41. API
  42. IAM
  43. Advanced Forensics Format
  44. RAM
  45. EDR
  46. IDS
  47. Incident Response
  48. CCPA
  49. Vulnerability