SecuritypostureAlertfatigueMITREATT&CKIncidentresponsePlaybookMalwarePhishingForensicanalysisDatabreachInsiderthreatThreatintelligenceSIEM(SecurityInformationand EventManagement)RansomwareSOCanalystRiskassessmentLateralmovementBlueteamRedteamZero-dayattackThreathuntingVulnerabilityscanningIOC(Indicator ofCompromise)PrivilegedaccessFirewallEndpointdetectionSecuritypostureAlertfatigueMITREATT&CKIncidentresponsePlaybookMalwarePhishingForensicanalysisDatabreachInsiderthreatThreatintelligenceSIEM(SecurityInformationand EventManagement)RansomwareSOCanalystRiskassessmentLateralmovementBlueteamRedteamZero-dayattackThreathuntingVulnerabilityscanningIOC(Indicator ofCompromise)PrivilegedaccessFirewallEndpointdetection

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Security posture
  2. Alert fatigue
  3. MITRE ATT&CK
  4. Incident response
  5. Playbook
  6. Malware
  7. Phishing
  8. Forensic analysis
  9. Data breach
  10. Insider threat
  11. Threat intelligence
  12. SIEM (Security Information and Event Management)
  13. Ransomware
  14. SOC analyst
  15. Risk assessment
  16. Lateral movement
  17. Blue team
  18. Red team
  19. Zero-day attack
  20. Threat hunting
  21. Vulnerability scanning
  22. IOC (Indicator of Compromise)
  23. Privileged access
  24. Firewall
  25. Endpoint detection