RedTeamingCloud-ComputingMalwareXDRPortalAIBECSITREPTailgatingAnalysisSearchEngineCompetentAuthorityLegalTechnologyCapacityBuildingSIEMStrategicRiskIPSIDSDDoSStrategicCommunicationsLLMIncidentResponse"It'sprobablya falsepositive"EDRResilienceRansomwareCRMComplianceCertificationMouse"I'llescalatethis"CyberSecurityAwarenessGDPRSocialEngineeringPasswordSecurityRAMPolicyEngagementMFAZero-Trust“Downloada file”NIS2PhishingDutyHandlerAnti-MoneyLaunderingEmailSecuritySOARCPUIncidentHandlerPythonEmailCyberchefZeroDayDORAPatchingPenetrationTestingVulnerability"It'sworkingon mymachine"MITREATT&CKRiskOpsBinaryEncryptionBashScript"I'lllookinto it”WebsiteSocialMediaOperatingSystemsAWSRiskAssessmentTeamsPhysicalPenetrationTestingAnalysisIAMFirewallCNIAdvancedForensicsFormatAgentBrowserExploitAPIBigDataDirectoratesKeyboardSecOpsRedTeamingCloud-ComputingMalwareXDRPortalAIBECSITREPTailgatingAnalysisSearchEngineCompetentAuthorityLegalTechnologyCapacityBuildingSIEMStrategicRiskIPSIDSDDoSStrategicCommunicationsLLMIncidentResponse"It'sprobablya falsepositive"EDRResilienceRansomwareCRMComplianceCertificationMouse"I'llescalatethis"CyberSecurityAwarenessGDPRSocialEngineeringPasswordSecurityRAMPolicyEngagementMFAZero-Trust“Downloada file”NIS2PhishingDutyHandlerAnti-MoneyLaunderingEmailSecuritySOARCPUIncidentHandlerPythonEmailCyberchefZeroDayDORAPatchingPenetrationTestingVulnerability"It'sworkingon mymachine"MITREATT&CKRiskOpsBinaryEncryptionBashScript"I'lllookinto it”WebsiteSocialMediaOperatingSystemsAWSRiskAssessmentTeamsPhysicalPenetrationTestingAnalysisIAMFirewallCNIAdvancedForensicsFormatAgentBrowserExploitAPIBigDataDirectoratesKeyboardSecOps

Christmas Party Tech Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
  1. Red Teaming
  2. Cloud-Computing
  3. Malware
  4. XDR
  5. Portal
  6. AI
  7. BEC
  8. SITREP
  9. Tailgating
  10. Analysis
  11. Search Engine
  12. Competent Authority
  13. Legal
  14. Technology
  15. Capacity Building
  16. SIEM
  17. Strategic Risk
  18. IPS
  19. IDS
  20. DDoS
  21. Strategic Communications
  22. LLM
  23. Incident Response
  24. "It's probably a false positive"
  25. EDR
  26. Resilience
  27. Ransomware
  28. CRM
  29. Compliance
  30. Certification
  31. Mouse
  32. "I'll escalate this"
  33. Cyber Security Awareness
  34. GDPR
  35. Social Engineering
  36. Password Security
  37. RAM
  38. Policy
  39. Engagement
  40. MFA
  41. Zero-Trust
  42. “Download a file”
  43. NIS2
  44. Phishing
  45. Duty Handler
  46. Anti-Money Laundering
  47. Email Security
  48. SOAR
  49. CPU
  50. Incident Handler
  51. Python
  52. Email
  53. Cyberchef
  54. Zero Day
  55. DORA
  56. Patching
  57. Penetration Testing
  58. Vulnerability
  59. "It's working on my machine"
  60. MITRE ATT&CK
  61. RiskOps
  62. Binary
  63. Encryption
  64. Bash Script
  65. "I'll look into it”
  66. Website
  67. Social Media
  68. Operating Systems
  69. AWS
  70. Risk Assessment
  71. Teams
  72. Physical Penetration TestingAnalysis
  73. IAM
  74. Firewall
  75. CNI
  76. Advanced Forensics Format
  77. Agent
  78. Browser
  79. Exploit
  80. API
  81. Big Data
  82. Directorates
  83. Keyboard
  84. SecOps