Zero- day attack Threat intelligence Risk assessment Red team Forensic analysis Insider threat MITRE ATT&CK Phishing IOC (Indicator of Compromise) Blue team Privileged access Malware Vulnerability scanning SOC analyst Threat hunting Playbook SIEM (Security Information and Event Management) Incident response Ransomware Endpoint detection Alert fatigue Security posture Lateral movement Data breach Firewall Zero- day attack Threat intelligence Risk assessment Red team Forensic analysis Insider threat MITRE ATT&CK Phishing IOC (Indicator of Compromise) Blue team Privileged access Malware Vulnerability scanning SOC analyst Threat hunting Playbook SIEM (Security Information and Event Management) Incident response Ransomware Endpoint detection Alert fatigue Security posture Lateral movement Data breach Firewall
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero-day attack
Threat intelligence
Risk assessment
Red team
Forensic analysis
Insider threat
MITRE ATT&CK
Phishing
IOC (Indicator of Compromise)
Blue team
Privileged access
Malware
Vulnerability scanning
SOC analyst
Threat hunting
Playbook
SIEM (Security Information and Event Management)
Incident response
Ransomware
Endpoint detection
Alert fatigue
Security posture
Lateral movement
Data breach
Firewall