Blue team IOC (Indicator of Compromise) Security posture Alert fatigue Privileged access MITRE ATT&CK Red team SIEM (Security Information and Event Management) Insider threat Threat hunting Phishing Zero- day attack Vulnerability scanning Lateral movement Firewall Incident response Playbook Risk assessment Forensic analysis Threat intelligence Endpoint detection Malware Ransomware SOC analyst Data breach Blue team IOC (Indicator of Compromise) Security posture Alert fatigue Privileged access MITRE ATT&CK Red team SIEM (Security Information and Event Management) Insider threat Threat hunting Phishing Zero- day attack Vulnerability scanning Lateral movement Firewall Incident response Playbook Risk assessment Forensic analysis Threat intelligence Endpoint detection Malware Ransomware SOC analyst Data breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Blue team
IOC (Indicator of Compromise)
Security posture
Alert fatigue
Privileged access
MITRE ATT&CK
Red team
SIEM (Security Information and Event Management)
Insider threat
Threat hunting
Phishing
Zero-day attack
Vulnerability scanning
Lateral movement
Firewall
Incident response
Playbook
Risk assessment
Forensic analysis
Threat intelligence
Endpoint detection
Malware
Ransomware
SOC analyst
Data breach