DDoSDirectoratesEngagementMITREATT&CKComplianceSOARMalwareDORATechnologyCNIIncidentHandlerCPUIAMSITREPZero-TrustCloud-ComputingCapacityBuildingEmailSecurityKeyboardNIS2PasswordSecurityBinaryRiskAssessmentZeroDayXDRMouseResilience"I'lllookinto it"RedTeamingEncryptionOperatingSystemsGDPRRiskOpsBrowserEDRDutyHandlerIPSCyberSecurityAwarenessIncidentResponse"It'sprobablya falsepositive"EmailBashScriptPatchingCompetentAuthorityPenetrationTestingSIEMTeamsMFAAWSAgentStrategicCommunicationsSocialEngineeringBigDataAnti-MoneyLaunderingAnalysis“Downloada file”PolicyIPSLLMBECPortalPhishingFirewall"I'llescalatethis"RansomwareAISearchEnginePythonStrategicRiskWebsiteCyberchefCRMIDSAdvancedForensicsFormat"It'sworkingon mymachine"APICertificationSocialMediaVulnerabilityExploitSecOpsLegalPhysicalPenetrationTestingRAMDDoSDirectoratesEngagementMITREATT&CKComplianceSOARMalwareDORATechnologyCNIIncidentHandlerCPUIAMSITREPZero-TrustCloud-ComputingCapacityBuildingEmailSecurityKeyboardNIS2PasswordSecurityBinaryRiskAssessmentZeroDayXDRMouseResilience"I'lllookinto it"RedTeamingEncryptionOperatingSystemsGDPRRiskOpsBrowserEDRDutyHandlerIPSCyberSecurityAwarenessIncidentResponse"It'sprobablya falsepositive"EmailBashScriptPatchingCompetentAuthorityPenetrationTestingSIEMTeamsMFAAWSAgentStrategicCommunicationsSocialEngineeringBigDataAnti-MoneyLaunderingAnalysis“Downloada file”PolicyIPSLLMBECPortalPhishingFirewall"I'llescalatethis"RansomwareAISearchEnginePythonStrategicRiskWebsiteCyberchefCRMIDSAdvancedForensicsFormat"It'sworkingon mymachine"APICertificationSocialMediaVulnerabilityExploitSecOpsLegalPhysicalPenetrationTestingRAM

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. DDoS
  2. Directorates
  3. Engagement
  4. MITRE ATT&CK
  5. Compliance
  6. SOAR
  7. Malware
  8. DORA
  9. Technology
  10. CNI
  11. Incident Handler
  12. CPU
  13. IAM
  14. SITREP
  15. Zero-Trust
  16. Cloud-Computing
  17. Capacity Building
  18. Email Security
  19. Keyboard
  20. NIS2
  21. Password Security
  22. Binary
  23. Risk Assessment
  24. Zero Day
  25. XDR
  26. Mouse
  27. Resilience
  28. "I'll look into it"
  29. Red Teaming
  30. Encryption
  31. Operating Systems
  32. GDPR
  33. RiskOps
  34. Browser
  35. EDR
  36. Duty Handler
  37. IPS
  38. Cyber Security Awareness
  39. Incident Response
  40. "It's probably a false positive"
  41. Email
  42. Bash Script
  43. Patching
  44. Competent Authority
  45. Penetration Testing
  46. SIEM
  47. Teams
  48. MFA
  49. AWS
  50. Agent
  51. Strategic Communications
  52. Social Engineering
  53. Big Data
  54. Anti-Money Laundering
  55. Analysis
  56. “Download a file”
  57. Policy
  58. IPS
  59. LLM
  60. BEC
  61. Portal
  62. Phishing
  63. Firewall
  64. "I'll escalate this"
  65. Ransomware
  66. AI
  67. Search Engine
  68. Python
  69. Strategic Risk
  70. Website
  71. Cyberchef
  72. CRM
  73. IDS
  74. Advanced Forensics Format
  75. "It's working on my machine"
  76. API
  77. Certification
  78. Social Media
  79. Vulnerability
  80. Exploit
  81. SecOps
  82. Legal
  83. Physical Penetration Testing
  84. RAM