IOC(Indicator ofCompromise)Zero-dayattackForensicanalysisRansomwareAlertfatigueSIEM(SecurityInformationand EventManagement)FirewallMITREATT&CKThreatintelligenceIncidentresponseInsiderthreatEndpointdetectionLateralmovementDatabreachMalwareSecurityposturePhishingThreathuntingRiskassessmentRedteamSOCanalystBlueteamPlaybookVulnerabilityscanningPrivilegedaccessIOC(Indicator ofCompromise)Zero-dayattackForensicanalysisRansomwareAlertfatigueSIEM(SecurityInformationand EventManagement)FirewallMITREATT&CKThreatintelligenceIncidentresponseInsiderthreatEndpointdetectionLateralmovementDatabreachMalwareSecurityposturePhishingThreathuntingRiskassessmentRedteamSOCanalystBlueteamPlaybookVulnerabilityscanningPrivilegedaccess

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. IOC (Indicator of Compromise)
  2. Zero-day attack
  3. Forensic analysis
  4. Ransomware
  5. Alert fatigue
  6. SIEM (Security Information and Event Management)
  7. Firewall
  8. MITRE ATT&CK
  9. Threat intelligence
  10. Incident response
  11. Insider threat
  12. Endpoint detection
  13. Lateral movement
  14. Data breach
  15. Malware
  16. Security posture
  17. Phishing
  18. Threat hunting
  19. Risk assessment
  20. Red team
  21. SOC analyst
  22. Blue team
  23. Playbook
  24. Vulnerability scanning
  25. Privileged access