SIEM(SecurityInformationand EventManagement)ThreathuntingSOCanalystRansomwareSecuritypostureEndpointdetectionForensicanalysisLateralmovementBlueteamMITREATT&CKPhishingPlaybookFirewallRiskassessmentMalwareIOC(Indicator ofCompromise)AlertfatigueVulnerabilityscanningThreatintelligenceIncidentresponseInsiderthreatZero-dayattackPrivilegedaccessRedteamDatabreachSIEM(SecurityInformationand EventManagement)ThreathuntingSOCanalystRansomwareSecuritypostureEndpointdetectionForensicanalysisLateralmovementBlueteamMITREATT&CKPhishingPlaybookFirewallRiskassessmentMalwareIOC(Indicator ofCompromise)AlertfatigueVulnerabilityscanningThreatintelligenceIncidentresponseInsiderthreatZero-dayattackPrivilegedaccessRedteamDatabreach

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. SIEM (Security Information and Event Management)
  2. Threat hunting
  3. SOC analyst
  4. Ransomware
  5. Security posture
  6. Endpoint detection
  7. Forensic analysis
  8. Lateral movement
  9. Blue team
  10. MITRE ATT&CK
  11. Phishing
  12. Playbook
  13. Firewall
  14. Risk assessment
  15. Malware
  16. IOC (Indicator of Compromise)
  17. Alert fatigue
  18. Vulnerability scanning
  19. Threat intelligence
  20. Incident response
  21. Insider threat
  22. Zero-day attack
  23. Privileged access
  24. Red team
  25. Data breach