IncidentHandlerPhishingAPIRansomwarePatchingTechnologyBinaryAnti-MoneyLaunderingCompetentAuthorityDutyHandlerFirewallDORAIDSSearchEngineBigDataGDPRIPSPortalVulnerabilityZeroDay"I'llescalatethis"DirectoratesPasswordSecuritySITREPCRMRiskAssessmentExploitSocialMediaPythonWebsite"I'lllookinto itEDRSecOpsStrategicRiskBECSIEMPenetrationTestingMouseSOARMITREATT&CKTailgatingAgentRAMCyberchefIAMIPSXDRLLMAnalysisEncryptionZero-TrustRedTeamingTeamsOperatingSystemsBrowserCloud-Computing"It'sworkingon mymachine"ComplianceAWSCNINIS2AdvancedForensicsFormat"It'sprobablya falsepositive"CapacityBuildingPhysicalPenetrationTestingCertificationResilienceRiskOpsPolicyBashScriptKeyboard“Downloada file”MFAEmailSecurityCyberSecurityAwarenessMalwareLegalDDoSSocialEngineeringEngagementAIStrategicCommunicationsIncidentResponseCPUIncidentHandlerPhishingAPIRansomwarePatchingTechnologyBinaryAnti-MoneyLaunderingCompetentAuthorityDutyHandlerFirewallDORAIDSSearchEngineBigDataGDPRIPSPortalVulnerabilityZeroDay"I'llescalatethis"DirectoratesPasswordSecuritySITREPCRMRiskAssessmentExploitSocialMediaPythonWebsite"I'lllookinto itEDRSecOpsStrategicRiskBECSIEMPenetrationTestingMouseSOARMITREATT&CKTailgatingAgentRAMCyberchefIAMIPSXDRLLMAnalysisEncryptionZero-TrustRedTeamingTeamsOperatingSystemsBrowserCloud-Computing"It'sworkingon mymachine"ComplianceAWSCNINIS2AdvancedForensicsFormat"It'sprobablya falsepositive"CapacityBuildingPhysicalPenetrationTestingCertificationResilienceRiskOpsPolicyBashScriptKeyboard“Downloada file”MFAEmailSecurityCyberSecurityAwarenessMalwareLegalDDoSSocialEngineeringEngagementAIStrategicCommunicationsIncidentResponseCPU

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. Incident Handler
  2. Phishing
  3. API
  4. Ransomware
  5. Patching
  6. Technology
  7. Binary
  8. Anti-Money Laundering
  9. Competent Authority
  10. Duty Handler
  11. Firewall
  12. DORA
  13. IDS
  14. Search Engine
  15. Big Data
  16. GDPR
  17. IPS
  18. Portal
  19. Vulnerability
  20. Zero Day
  21. "I'll escalate this"
  22. Directorates
  23. Password Security
  24. SITREP
  25. CRM
  26. Risk Assessment
  27. Exploit
  28. Social Media
  29. Python
  30. Website
  31. "I'll look into it
  32. EDR
  33. SecOps
  34. Strategic Risk
  35. BEC
  36. SIEM
  37. Penetration Testing
  38. Mouse
  39. SOAR
  40. MITRE ATT&CK
  41. Tailgating
  42. Agent
  43. RAM
  44. Cyberchef
  45. IAM
  46. IPS
  47. XDR
  48. LLM
  49. Analysis
  50. Encryption
  51. Zero-Trust
  52. Red Teaming
  53. Teams
  54. Operating Systems
  55. Browser
  56. Cloud-Computing
  57. "It's working on my machine"
  58. Compliance
  59. AWS
  60. CNI
  61. NIS2
  62. Advanced Forensics Format
  63. "It's probably a false positive"
  64. Capacity Building
  65. Physical Penetration Testing
  66. Certification
  67. Resilience
  68. RiskOps
  69. Policy
  70. Bash Script
  71. Keyboard
  72. “Download a file”
  73. MFA
  74. Email Security
  75. Cyber Security Awareness
  76. Malware
  77. Legal
  78. DDoS
  79. Social Engineering
  80. Engagement
  81. AI
  82. Strategic Communications
  83. Incident Response
  84. CPU