PlaybookRansomwareInsiderthreatIOC(Indicator ofCompromise)BlueteamMITREATT&CKVulnerabilityscanningSIEM(SecurityInformationand EventManagement)IncidentresponseThreathuntingSOCanalystThreatintelligenceRiskassessmentSecuritypostureMalwareLateralmovementFirewallZero-dayattackForensicanalysisRedteamDatabreachPrivilegedaccessPhishingEndpointdetectionAlertfatiguePlaybookRansomwareInsiderthreatIOC(Indicator ofCompromise)BlueteamMITREATT&CKVulnerabilityscanningSIEM(SecurityInformationand EventManagement)IncidentresponseThreathuntingSOCanalystThreatintelligenceRiskassessmentSecuritypostureMalwareLateralmovementFirewallZero-dayattackForensicanalysisRedteamDatabreachPrivilegedaccessPhishingEndpointdetectionAlertfatigue

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Playbook
  2. Ransomware
  3. Insider threat
  4. IOC (Indicator of Compromise)
  5. Blue team
  6. MITRE ATT&CK
  7. Vulnerability scanning
  8. SIEM (Security Information and Event Management)
  9. Incident response
  10. Threat hunting
  11. SOC analyst
  12. Threat intelligence
  13. Risk assessment
  14. Security posture
  15. Malware
  16. Lateral movement
  17. Firewall
  18. Zero-day attack
  19. Forensic analysis
  20. Red team
  21. Data breach
  22. Privileged access
  23. Phishing
  24. Endpoint detection
  25. Alert fatigue