EndpointdetectionVulnerabilityscanningSecurityposturePrivilegedaccessLateralmovementMITREATT&CKAlertfatigueSOCanalystPhishingDatabreachRiskassessmentForensicanalysisMalwareThreatintelligenceRansomwareRedteamPlaybookBlueteamZero-dayattackIOC(Indicator ofCompromise)FirewallIncidentresponseSIEM(SecurityInformationand EventManagement)InsiderthreatThreathuntingEndpointdetectionVulnerabilityscanningSecurityposturePrivilegedaccessLateralmovementMITREATT&CKAlertfatigueSOCanalystPhishingDatabreachRiskassessmentForensicanalysisMalwareThreatintelligenceRansomwareRedteamPlaybookBlueteamZero-dayattackIOC(Indicator ofCompromise)FirewallIncidentresponseSIEM(SecurityInformationand EventManagement)InsiderthreatThreathunting

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Endpoint detection
  2. Vulnerability scanning
  3. Security posture
  4. Privileged access
  5. Lateral movement
  6. MITRE ATT&CK
  7. Alert fatigue
  8. SOC analyst
  9. Phishing
  10. Data breach
  11. Risk assessment
  12. Forensic analysis
  13. Malware
  14. Threat intelligence
  15. Ransomware
  16. Red team
  17. Playbook
  18. Blue team
  19. Zero-day attack
  20. IOC (Indicator of Compromise)
  21. Firewall
  22. Incident response
  23. SIEM (Security Information and Event Management)
  24. Insider threat
  25. Threat hunting