GDPRDDoSFirewallPenetrationTestingPhysicalPenetrationTestingAnalysisBrowser"I'lllookinto it”CompetentAuthoritySocialEngineeringEngagementCyberSecurityAwarenessRansomwareAnti-MoneyLaunderingMFACloud-ComputingAgentCapacityBuildingSITREPTeamsBashScriptZero-TrustBigDataResilienceTechnologyAPIOperatingSystemsWebsiteIAMIPSAnalysisDutyHandlerSocialMediaEncryptionPasswordSecurityIncidentResponseRedTeamingCRMLegalVulnerabilityRiskAssessmentCNIIncidentHandlerMalwareAI"It'sprobablya falsepositive"SearchEnginePortalEmailSecurityCyberchefBinaryPolicySIEM“Downloada file”PythonStrategicRiskZeroDayBECDirectoratesSecOpsKeyboardPhishingRiskOpsComplianceRAMAdvancedForensicsFormatSOARPatchingMouse"It'sworkingon mymachine"MITREATT&CKEDRLLMDORAIDSExploitEmailStrategicCommunicationsAWS"I'llescalatethis"TailgatingCertificationXDRNIS2CPUGDPRDDoSFirewallPenetrationTestingPhysicalPenetrationTestingAnalysisBrowser"I'lllookinto it”CompetentAuthoritySocialEngineeringEngagementCyberSecurityAwarenessRansomwareAnti-MoneyLaunderingMFACloud-ComputingAgentCapacityBuildingSITREPTeamsBashScriptZero-TrustBigDataResilienceTechnologyAPIOperatingSystemsWebsiteIAMIPSAnalysisDutyHandlerSocialMediaEncryptionPasswordSecurityIncidentResponseRedTeamingCRMLegalVulnerabilityRiskAssessmentCNIIncidentHandlerMalwareAI"It'sprobablya falsepositive"SearchEnginePortalEmailSecurityCyberchefBinaryPolicySIEM“Downloada file”PythonStrategicRiskZeroDayBECDirectoratesSecOpsKeyboardPhishingRiskOpsComplianceRAMAdvancedForensicsFormatSOARPatchingMouse"It'sworkingon mymachine"MITREATT&CKEDRLLMDORAIDSExploitEmailStrategicCommunicationsAWS"I'llescalatethis"TailgatingCertificationXDRNIS2CPU

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. GDPR
  2. DDoS
  3. Firewall
  4. Penetration Testing
  5. Physical Penetration TestingAnalysis
  6. Browser
  7. "I'll look into it”
  8. Competent Authority
  9. Social Engineering
  10. Engagement
  11. Cyber Security Awareness
  12. Ransomware
  13. Anti-Money Laundering
  14. MFA
  15. Cloud-Computing
  16. Agent
  17. Capacity Building
  18. SITREP
  19. Teams
  20. Bash Script
  21. Zero-Trust
  22. Big Data
  23. Resilience
  24. Technology
  25. API
  26. Operating Systems
  27. Website
  28. IAM
  29. IPS
  30. Analysis
  31. Duty Handler
  32. Social Media
  33. Encryption
  34. Password Security
  35. Incident Response
  36. Red Teaming
  37. CRM
  38. Legal
  39. Vulnerability
  40. Risk Assessment
  41. CNI
  42. Incident Handler
  43. Malware
  44. AI
  45. "It's probably a false positive"
  46. Search Engine
  47. Portal
  48. Email Security
  49. Cyberchef
  50. Binary
  51. Policy
  52. SIEM
  53. “Download a file”
  54. Python
  55. Strategic Risk
  56. Zero Day
  57. BEC
  58. Directorates
  59. SecOps
  60. Keyboard
  61. Phishing
  62. RiskOps
  63. Compliance
  64. RAM
  65. Advanced Forensics Format
  66. SOAR
  67. Patching
  68. Mouse
  69. "It's working on my machine"
  70. MITRE ATT&CK
  71. EDR
  72. LLM
  73. DORA
  74. IDS
  75. Exploit
  76. Email
  77. Strategic Communications
  78. AWS
  79. "I'll escalate this"
  80. Tailgating
  81. Certification
  82. XDR
  83. NIS2
  84. CPU