CompetentAuthorityBigDataTeamsStrategicCommunicationsSearchEngineSIEMSOARPhysicalPenetrationTestingRansomwareLegalAgentComplianceIPSCloud-ComputingPenetrationTestingEDRPatchingZero-TrustEmailSecurityAdvancedForensicsFormatSocialEngineeringFirewallAnalysisAWSCyberchefBinary“Downloada file”ExploitRiskAssessmentAnti-MoneyLaunderingRedTeamingDDoSStrategicRiskTailgatingPolicyPythonResilience"It'sprobablya falsepositive"MalwareNIS2BashScriptRiskOpsVulnerabilityBrowserCertificationTechnologyDirectoratesCapacityBuildingSecOpsAIEncryptionMouseBECCyberSecurityAwarenessXDRSITREPZeroDayIDSGDPROperatingSystemsDORAMFAPortalLLM"It'sworkingon mymachine"SocialMediaIncidentResponseKeyboardMITREATT&CKIncidentHandlerCNIIAMCPU"I'lllookinto it”PasswordSecurityEngagementRAMEmailAPI"I'llescalatethis"PhishingDutyHandlerWebsiteCRMCompetentAuthorityBigDataTeamsStrategicCommunicationsSearchEngineSIEMSOARPhysicalPenetrationTestingRansomwareLegalAgentComplianceIPSCloud-ComputingPenetrationTestingEDRPatchingZero-TrustEmailSecurityAdvancedForensicsFormatSocialEngineeringFirewallAnalysisAWSCyberchefBinary“Downloada file”ExploitRiskAssessmentAnti-MoneyLaunderingRedTeamingDDoSStrategicRiskTailgatingPolicyPythonResilience"It'sprobablya falsepositive"MalwareNIS2BashScriptRiskOpsVulnerabilityBrowserCertificationTechnologyDirectoratesCapacityBuildingSecOpsAIEncryptionMouseBECCyberSecurityAwarenessXDRSITREPZeroDayIDSGDPROperatingSystemsDORAMFAPortalLLM"It'sworkingon mymachine"SocialMediaIncidentResponseKeyboardMITREATT&CKIncidentHandlerCNIIAMCPU"I'lllookinto it”PasswordSecurityEngagementRAMEmailAPI"I'llescalatethis"PhishingDutyHandlerWebsiteCRM

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. Competent Authority
  2. Big Data
  3. Teams
  4. Strategic Communications
  5. Search Engine
  6. SIEM
  7. SOAR
  8. Physical Penetration Testing
  9. Ransomware
  10. Legal
  11. Agent
  12. Compliance
  13. IPS
  14. Cloud-Computing
  15. Penetration Testing
  16. EDR
  17. Patching
  18. Zero-Trust
  19. Email Security
  20. Advanced Forensics Format
  21. Social Engineering
  22. Firewall
  23. Analysis
  24. AWS
  25. Cyberchef
  26. Binary
  27. “Download a file”
  28. Exploit
  29. Risk Assessment
  30. Anti-Money Laundering
  31. Red Teaming
  32. DDoS
  33. Strategic Risk
  34. Tailgating
  35. Policy
  36. Python
  37. Resilience
  38. "It's probably a false positive"
  39. Malware
  40. NIS2
  41. Bash Script
  42. RiskOps
  43. Vulnerability
  44. Browser
  45. Certification
  46. Technology
  47. Directorates
  48. Capacity Building
  49. SecOps
  50. AI
  51. Encryption
  52. Mouse
  53. BEC
  54. Cyber Security Awareness
  55. XDR
  56. SITREP
  57. Zero Day
  58. IDS
  59. GDPR
  60. Operating Systems
  61. DORA
  62. MFA
  63. Portal
  64. LLM
  65. "It's working on my machine"
  66. Social Media
  67. Incident Response
  68. Keyboard
  69. MITRE ATT&CK
  70. Incident Handler
  71. CNI
  72. IAM
  73. CPU
  74. "I'll look into it”
  75. Password Security
  76. Engagement
  77. RAM
  78. Email
  79. API
  80. "I'll escalate this"
  81. Phishing
  82. Duty Handler
  83. Website
  84. CRM