Security posture Alert fatigue MITRE ATT&CK Incident response Playbook Malware Phishing Forensic analysis Data breach Insider threat Threat intelligence SIEM (Security Information and Event Management) Ransomware SOC analyst Risk assessment Lateral movement Blue team Red team Zero- day attack Threat hunting Vulnerability scanning IOC (Indicator of Compromise) Privileged access Firewall Endpoint detection Security posture Alert fatigue MITRE ATT&CK Incident response Playbook Malware Phishing Forensic analysis Data breach Insider threat Threat intelligence SIEM (Security Information and Event Management) Ransomware SOC analyst Risk assessment Lateral movement Blue team Red team Zero- day attack Threat hunting Vulnerability scanning IOC (Indicator of Compromise) Privileged access Firewall Endpoint detection
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security posture
Alert fatigue
MITRE ATT&CK
Incident response
Playbook
Malware
Phishing
Forensic analysis
Data breach
Insider threat
Threat intelligence
SIEM (Security Information and Event Management)
Ransomware
SOC analyst
Risk assessment
Lateral movement
Blue team
Red team
Zero-day attack
Threat hunting
Vulnerability scanning
IOC (Indicator of Compromise)
Privileged access
Firewall
Endpoint detection