AINIS2BrowserComplianceCRMSecOpsVulnerabilityFirewallLLMMalwarePortalDutyHandlerSocialMediaAnalysisIncidentHandlerIPSAWSSITREPRiskOpsCyberSecurityAwarenessTechnologyIDSAdvancedForensicsFormatKeyboardAnti-MoneyLaunderingSIEMSocialEngineeringResilienceStrategicCommunicationsGDPRDORABashScriptTeamsXDRCapacityBuildingAPI"It'sworkingon mymachine"EDRSearchEnginePolicyPasswordSecurityLegalPatchingExploitCNIIPS"I'llescalatethis"EmailAgentEngagementSOARBigDataRiskAssessmentZeroDayDDoSEncryptionPythonStrategicRiskBECCPUPhysicalPenetrationTestingPenetrationTestingOperatingSystemsCompetentAuthorityRansomwareRedTeaming"It'sprobablya falsepositive"“Downloada file”WebsiteMITREATT&CKDirectoratesIncidentResponseZero-TrustMFAEmailSecurityCloud-ComputingBinaryRAMMouseCyberchefIAMPhishingCertification"I'lllookinto it"AINIS2BrowserComplianceCRMSecOpsVulnerabilityFirewallLLMMalwarePortalDutyHandlerSocialMediaAnalysisIncidentHandlerIPSAWSSITREPRiskOpsCyberSecurityAwarenessTechnologyIDSAdvancedForensicsFormatKeyboardAnti-MoneyLaunderingSIEMSocialEngineeringResilienceStrategicCommunicationsGDPRDORABashScriptTeamsXDRCapacityBuildingAPI"It'sworkingon mymachine"EDRSearchEnginePolicyPasswordSecurityLegalPatchingExploitCNIIPS"I'llescalatethis"EmailAgentEngagementSOARBigDataRiskAssessmentZeroDayDDoSEncryptionPythonStrategicRiskBECCPUPhysicalPenetrationTestingPenetrationTestingOperatingSystemsCompetentAuthorityRansomwareRedTeaming"It'sprobablya falsepositive"“Downloada file”WebsiteMITREATT&CKDirectoratesIncidentResponseZero-TrustMFAEmailSecurityCloud-ComputingBinaryRAMMouseCyberchefIAMPhishingCertification"I'lllookinto it"

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. AI
  2. NIS2
  3. Browser
  4. Compliance
  5. CRM
  6. SecOps
  7. Vulnerability
  8. Firewall
  9. LLM
  10. Malware
  11. Portal
  12. Duty Handler
  13. Social Media
  14. Analysis
  15. Incident Handler
  16. IPS
  17. AWS
  18. SITREP
  19. RiskOps
  20. Cyber Security Awareness
  21. Technology
  22. IDS
  23. Advanced Forensics Format
  24. Keyboard
  25. Anti-Money Laundering
  26. SIEM
  27. Social Engineering
  28. Resilience
  29. Strategic Communications
  30. GDPR
  31. DORA
  32. Bash Script
  33. Teams
  34. XDR
  35. Capacity Building
  36. API
  37. "It's working on my machine"
  38. EDR
  39. Search Engine
  40. Policy
  41. Password Security
  42. Legal
  43. Patching
  44. Exploit
  45. CNI
  46. IPS
  47. "I'll escalate this"
  48. Email
  49. Agent
  50. Engagement
  51. SOAR
  52. Big Data
  53. Risk Assessment
  54. Zero Day
  55. DDoS
  56. Encryption
  57. Python
  58. Strategic Risk
  59. BEC
  60. CPU
  61. Physical Penetration Testing
  62. Penetration Testing
  63. Operating Systems
  64. Competent Authority
  65. Ransomware
  66. Red Teaming
  67. "It's probably a false positive"
  68. “Download a file”
  69. Website
  70. MITRE ATT&CK
  71. Directorates
  72. Incident Response
  73. Zero-Trust
  74. MFA
  75. Email Security
  76. Cloud-Computing
  77. Binary
  78. RAM
  79. Mouse
  80. Cyberchef
  81. IAM
  82. Phishing
  83. Certification
  84. "I'll look into it"