BlueteamIOC(Indicator ofCompromise)SecuritypostureAlertfatiguePrivilegedaccessMITREATT&CKRedteamSIEM(SecurityInformationand EventManagement)InsiderthreatThreathuntingPhishingZero-dayattackVulnerabilityscanningLateralmovementFirewallIncidentresponsePlaybookRiskassessmentForensicanalysisThreatintelligenceEndpointdetectionMalwareRansomwareSOCanalystDatabreachBlueteamIOC(Indicator ofCompromise)SecuritypostureAlertfatiguePrivilegedaccessMITREATT&CKRedteamSIEM(SecurityInformationand EventManagement)InsiderthreatThreathuntingPhishingZero-dayattackVulnerabilityscanningLateralmovementFirewallIncidentresponsePlaybookRiskassessmentForensicanalysisThreatintelligenceEndpointdetectionMalwareRansomwareSOCanalystDatabreach

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Blue team
  2. IOC (Indicator of Compromise)
  3. Security posture
  4. Alert fatigue
  5. Privileged access
  6. MITRE ATT&CK
  7. Red team
  8. SIEM (Security Information and Event Management)
  9. Insider threat
  10. Threat hunting
  11. Phishing
  12. Zero-day attack
  13. Vulnerability scanning
  14. Lateral movement
  15. Firewall
  16. Incident response
  17. Playbook
  18. Risk assessment
  19. Forensic analysis
  20. Threat intelligence
  21. Endpoint detection
  22. Malware
  23. Ransomware
  24. SOC analyst
  25. Data breach