Privileged access Endpoint detection Malware Insider threat Firewall Red team Blue team Security posture SIEM (Security Information and Event Management) Forensic analysis MITRE ATT&CK Playbook Zero- day attack SOC analyst Phishing Incident response Lateral movement Data breach Alert fatigue Ransomware Risk assessment Threat intelligence IOC (Indicator of Compromise) Vulnerability scanning Threat hunting Privileged access Endpoint detection Malware Insider threat Firewall Red team Blue team Security posture SIEM (Security Information and Event Management) Forensic analysis MITRE ATT&CK Playbook Zero- day attack SOC analyst Phishing Incident response Lateral movement Data breach Alert fatigue Ransomware Risk assessment Threat intelligence IOC (Indicator of Compromise) Vulnerability scanning Threat hunting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Privileged access
Endpoint detection
Malware
Insider threat
Firewall
Red team
Blue team
Security posture
SIEM (Security Information and Event Management)
Forensic analysis
MITRE ATT&CK
Playbook
Zero-day attack
SOC analyst
Phishing
Incident response
Lateral movement
Data breach
Alert fatigue
Ransomware
Risk assessment
Threat intelligence
IOC (Indicator of Compromise)
Vulnerability scanning
Threat hunting