IAMLegal"It'sworkingon mymachine"Zero-TrustEmailSecurityMFAPhysicalPenetrationTestingCNITailgatingCertificationLLMPasswordSecurityMITREATT&CKExploitIPSIDSBigData“Downloada file”DORASocialMediaOperatingSystemsRAMAnalysisAgentMouseSOARSocialEngineeringRedTeamingKeyboardAnti-MoneyLaunderingBashScriptCyberSecurityAwarenessCloud-ComputingNIS2CyberchefEDRTeamsRiskOpsIncidentResponsePythonAWSCapacityBuildingXDRPatchingPortalStrategicRiskPolicyStrategicCommunicationsCompetentAuthorityBrowserBinary"I'lllookinto it”EngagementSearchEngine"I'llescalatethis"ResilienceBECAdvancedForensicsFormatWebsiteZeroDayFirewallAIDDoS"It'sprobablya falsepositive"DirectoratesTechnologyCompliancePhishingEmailGDPRPenetrationTestingSITREPSecOpsVulnerabilityCPUMalwareEncryptionDutyHandlerRiskAssessmentSIEMRansomwareIncidentHandlerCRMAPIIAMLegal"It'sworkingon mymachine"Zero-TrustEmailSecurityMFAPhysicalPenetrationTestingCNITailgatingCertificationLLMPasswordSecurityMITREATT&CKExploitIPSIDSBigData“Downloada file”DORASocialMediaOperatingSystemsRAMAnalysisAgentMouseSOARSocialEngineeringRedTeamingKeyboardAnti-MoneyLaunderingBashScriptCyberSecurityAwarenessCloud-ComputingNIS2CyberchefEDRTeamsRiskOpsIncidentResponsePythonAWSCapacityBuildingXDRPatchingPortalStrategicRiskPolicyStrategicCommunicationsCompetentAuthorityBrowserBinary"I'lllookinto it”EngagementSearchEngine"I'llescalatethis"ResilienceBECAdvancedForensicsFormatWebsiteZeroDayFirewallAIDDoS"It'sprobablya falsepositive"DirectoratesTechnologyCompliancePhishingEmailGDPRPenetrationTestingSITREPSecOpsVulnerabilityCPUMalwareEncryptionDutyHandlerRiskAssessmentSIEMRansomwareIncidentHandlerCRMAPI

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. IAM
  2. Legal
  3. "It's working on my machine"
  4. Zero-Trust
  5. Email Security
  6. MFA
  7. Physical Penetration Testing
  8. CNI
  9. Tailgating
  10. Certification
  11. LLM
  12. Password Security
  13. MITRE ATT&CK
  14. Exploit
  15. IPS
  16. IDS
  17. Big Data
  18. “Download a file”
  19. DORA
  20. Social Media
  21. Operating Systems
  22. RAM
  23. Analysis
  24. Agent
  25. Mouse
  26. SOAR
  27. Social Engineering
  28. Red Teaming
  29. Keyboard
  30. Anti-Money Laundering
  31. Bash Script
  32. Cyber Security Awareness
  33. Cloud-Computing
  34. NIS2
  35. Cyberchef
  36. EDR
  37. Teams
  38. RiskOps
  39. Incident Response
  40. Python
  41. AWS
  42. Capacity Building
  43. XDR
  44. Patching
  45. Portal
  46. Strategic Risk
  47. Policy
  48. Strategic Communications
  49. Competent Authority
  50. Browser
  51. Binary
  52. "I'll look into it”
  53. Engagement
  54. Search Engine
  55. "I'll escalate this"
  56. Resilience
  57. BEC
  58. Advanced Forensics Format
  59. Website
  60. Zero Day
  61. Firewall
  62. AI
  63. DDoS
  64. "It's probably a false positive"
  65. Directorates
  66. Technology
  67. Compliance
  68. Phishing
  69. Email
  70. GDPR
  71. Penetration Testing
  72. SITREP
  73. SecOps
  74. Vulnerability
  75. CPU
  76. Malware
  77. Encryption
  78. Duty Handler
  79. Risk Assessment
  80. SIEM
  81. Ransomware
  82. Incident Handler
  83. CRM
  84. API