SIEMDDoSIPSAWSZeroDayLegalGDPRExploitCRMIAMAPI"It'sworkingon mymachine"RedTeamingCloud-ComputingCompetentAuthorityRAMBrowserSOARTailgatingEncryptionTechnologyPolicyCyberchefRiskAssessmentPasswordSecurityMalwareCapacityBuildingSearchEngineZero-TrustMouseVulnerabilityWebsiteAnalysisCNI“Downloada file”LLMAIBinaryRansomwareBECAnti-MoneyLaunderingXDRBashScriptIncidentResponseBigDataEDRCPUEngagementPortalTeamsIncidentHandlerMFAKeyboardSocialEngineeringPhishing"I'llescalatethis"ComplianceStrategicRisk"It'sprobablya falsepositive"EmailSecurityOperatingSystemsFirewallPhysicalPenetrationTestingSecOpsResilienceDirectoratesCertificationPythonDORADutyHandlerAgentAdvancedForensicsFormatEmail"I'lllookinto it”IDSCyberSecurityAwarenessPenetrationTestingSITREPPatchingNIS2SocialMediaMITREATT&CKRiskOpsStrategicCommunicationsSIEMDDoSIPSAWSZeroDayLegalGDPRExploitCRMIAMAPI"It'sworkingon mymachine"RedTeamingCloud-ComputingCompetentAuthorityRAMBrowserSOARTailgatingEncryptionTechnologyPolicyCyberchefRiskAssessmentPasswordSecurityMalwareCapacityBuildingSearchEngineZero-TrustMouseVulnerabilityWebsiteAnalysisCNI“Downloada file”LLMAIBinaryRansomwareBECAnti-MoneyLaunderingXDRBashScriptIncidentResponseBigDataEDRCPUEngagementPortalTeamsIncidentHandlerMFAKeyboardSocialEngineeringPhishing"I'llescalatethis"ComplianceStrategicRisk"It'sprobablya falsepositive"EmailSecurityOperatingSystemsFirewallPhysicalPenetrationTestingSecOpsResilienceDirectoratesCertificationPythonDORADutyHandlerAgentAdvancedForensicsFormatEmail"I'lllookinto it”IDSCyberSecurityAwarenessPenetrationTestingSITREPPatchingNIS2SocialMediaMITREATT&CKRiskOpsStrategicCommunications

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. SIEM
  2. DDoS
  3. IPS
  4. AWS
  5. Zero Day
  6. Legal
  7. GDPR
  8. Exploit
  9. CRM
  10. IAM
  11. API
  12. "It's working on my machine"
  13. Red Teaming
  14. Cloud-Computing
  15. Competent Authority
  16. RAM
  17. Browser
  18. SOAR
  19. Tailgating
  20. Encryption
  21. Technology
  22. Policy
  23. Cyberchef
  24. Risk Assessment
  25. Password Security
  26. Malware
  27. Capacity Building
  28. Search Engine
  29. Zero-Trust
  30. Mouse
  31. Vulnerability
  32. Website
  33. Analysis
  34. CNI
  35. “Download a file”
  36. LLM
  37. AI
  38. Binary
  39. Ransomware
  40. BEC
  41. Anti-Money Laundering
  42. XDR
  43. Bash Script
  44. Incident Response
  45. Big Data
  46. EDR
  47. CPU
  48. Engagement
  49. Portal
  50. Teams
  51. Incident Handler
  52. MFA
  53. Keyboard
  54. Social Engineering
  55. Phishing
  56. "I'll escalate this"
  57. Compliance
  58. Strategic Risk
  59. "It's probably a false positive"
  60. Email Security
  61. Operating Systems
  62. Firewall
  63. Physical Penetration Testing
  64. SecOps
  65. Resilience
  66. Directorates
  67. Certification
  68. Python
  69. DORA
  70. Duty Handler
  71. Agent
  72. Advanced Forensics Format
  73. Email
  74. "I'll look into it”
  75. IDS
  76. Cyber Security Awareness
  77. Penetration Testing
  78. SITREP
  79. Patching
  80. NIS2
  81. Social Media
  82. MITRE ATT&CK
  83. RiskOps
  84. Strategic Communications