DirectoratesPasswordSecurityAnalysisLegalDDoSIAMDutyHandlerAWSBECCapacityBuildingStrategicCommunicationsExploitVulnerabilityPortalDORA"It'sworkingon mymachine"IncidentHandlerSecOpsAIZero-TrustBashScriptPhysicalPenetrationTestingSITREPSocialMediaBrowserAnti-MoneyLaunderingMouseSocialEngineeringRiskOpsSOAROperatingSystemsPhishingMFACertificationNIS2ZeroDay"It'sprobablya falsepositive"IPSEncryptionPenetrationTestingWebsiteEmailPython"I'lllookinto it”Cloud-ComputingBigDataPatchingCyberchefMITREATT&CKLLMIDSAgentPolicyCNITechnologyAdvancedForensicsFormatCompliance“Downloada file”RAMAPIBinaryCRMRansomwareIncidentResponseCompetentAuthoritySearchEngineEngagement"I'llescalatethis"CPUEDRRiskAssessmentKeyboardFirewallResilienceEmailSecurityXDRStrategicRiskMalwareTailgatingGDPRSIEMCyberSecurityAwarenessTeamsRedTeamingDirectoratesPasswordSecurityAnalysisLegalDDoSIAMDutyHandlerAWSBECCapacityBuildingStrategicCommunicationsExploitVulnerabilityPortalDORA"It'sworkingon mymachine"IncidentHandlerSecOpsAIZero-TrustBashScriptPhysicalPenetrationTestingSITREPSocialMediaBrowserAnti-MoneyLaunderingMouseSocialEngineeringRiskOpsSOAROperatingSystemsPhishingMFACertificationNIS2ZeroDay"It'sprobablya falsepositive"IPSEncryptionPenetrationTestingWebsiteEmailPython"I'lllookinto it”Cloud-ComputingBigDataPatchingCyberchefMITREATT&CKLLMIDSAgentPolicyCNITechnologyAdvancedForensicsFormatCompliance“Downloada file”RAMAPIBinaryCRMRansomwareIncidentResponseCompetentAuthoritySearchEngineEngagement"I'llescalatethis"CPUEDRRiskAssessmentKeyboardFirewallResilienceEmailSecurityXDRStrategicRiskMalwareTailgatingGDPRSIEMCyberSecurityAwarenessTeamsRedTeaming

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. Directorates
  2. Password Security
  3. Analysis
  4. Legal
  5. DDoS
  6. IAM
  7. Duty Handler
  8. AWS
  9. BEC
  10. Capacity Building
  11. Strategic Communications
  12. Exploit
  13. Vulnerability
  14. Portal
  15. DORA
  16. "It's working on my machine"
  17. Incident Handler
  18. SecOps
  19. AI
  20. Zero-Trust
  21. Bash Script
  22. Physical Penetration Testing
  23. SITREP
  24. Social Media
  25. Browser
  26. Anti-Money Laundering
  27. Mouse
  28. Social Engineering
  29. RiskOps
  30. SOAR
  31. Operating Systems
  32. Phishing
  33. MFA
  34. Certification
  35. NIS2
  36. Zero Day
  37. "It's probably a false positive"
  38. IPS
  39. Encryption
  40. Penetration Testing
  41. Website
  42. Email
  43. Python
  44. "I'll look into it”
  45. Cloud-Computing
  46. Big Data
  47. Patching
  48. Cyberchef
  49. MITRE ATT&CK
  50. LLM
  51. IDS
  52. Agent
  53. Policy
  54. CNI
  55. Technology
  56. Advanced Forensics Format
  57. Compliance
  58. “Download a file”
  59. RAM
  60. API
  61. Binary
  62. CRM
  63. Ransomware
  64. Incident Response
  65. Competent Authority
  66. Search Engine
  67. Engagement
  68. "I'll escalate this"
  69. CPU
  70. EDR
  71. Risk Assessment
  72. Keyboard
  73. Firewall
  74. Resilience
  75. Email Security
  76. XDR
  77. Strategic Risk
  78. Malware
  79. Tailgating
  80. GDPR
  81. SIEM
  82. Cyber Security Awareness
  83. Teams
  84. Red Teaming