Playbook Ransomware Insider threat IOC (Indicator of Compromise) Blue team MITRE ATT&CK Vulnerability scanning SIEM (Security Information and Event Management) Incident response Threat hunting SOC analyst Threat intelligence Risk assessment Security posture Malware Lateral movement Firewall Zero- day attack Forensic analysis Red team Data breach Privileged access Phishing Endpoint detection Alert fatigue Playbook Ransomware Insider threat IOC (Indicator of Compromise) Blue team MITRE ATT&CK Vulnerability scanning SIEM (Security Information and Event Management) Incident response Threat hunting SOC analyst Threat intelligence Risk assessment Security posture Malware Lateral movement Firewall Zero- day attack Forensic analysis Red team Data breach Privileged access Phishing Endpoint detection Alert fatigue
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Playbook
Ransomware
Insider threat
IOC (Indicator of Compromise)
Blue team
MITRE ATT&CK
Vulnerability scanning
SIEM (Security Information and Event Management)
Incident response
Threat hunting
SOC analyst
Threat intelligence
Risk assessment
Security posture
Malware
Lateral movement
Firewall
Zero-day attack
Forensic analysis
Red team
Data breach
Privileged access
Phishing
Endpoint detection
Alert fatigue