IOC (Indicator of Compromise) Zero- day attack Forensic analysis Ransomware Alert fatigue SIEM (Security Information and Event Management) Firewall MITRE ATT&CK Threat intelligence Incident response Insider threat Endpoint detection Lateral movement Data breach Malware Security posture Phishing Threat hunting Risk assessment Red team SOC analyst Blue team Playbook Vulnerability scanning Privileged access IOC (Indicator of Compromise) Zero- day attack Forensic analysis Ransomware Alert fatigue SIEM (Security Information and Event Management) Firewall MITRE ATT&CK Threat intelligence Incident response Insider threat Endpoint detection Lateral movement Data breach Malware Security posture Phishing Threat hunting Risk assessment Red team SOC analyst Blue team Playbook Vulnerability scanning Privileged access
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IOC (Indicator of Compromise)
Zero-day attack
Forensic analysis
Ransomware
Alert fatigue
SIEM (Security Information and Event Management)
Firewall
MITRE ATT&CK
Threat intelligence
Incident response
Insider threat
Endpoint detection
Lateral movement
Data breach
Malware
Security posture
Phishing
Threat hunting
Risk assessment
Red team
SOC analyst
Blue team
Playbook
Vulnerability scanning
Privileged access