SIEM (Security Information and Event Management) Threat hunting SOC analyst Ransomware Security posture Endpoint detection Forensic analysis Lateral movement Blue team MITRE ATT&CK Phishing Playbook Firewall Risk assessment Malware IOC (Indicator of Compromise) Alert fatigue Vulnerability scanning Threat intelligence Incident response Insider threat Zero- day attack Privileged access Red team Data breach SIEM (Security Information and Event Management) Threat hunting SOC analyst Ransomware Security posture Endpoint detection Forensic analysis Lateral movement Blue team MITRE ATT&CK Phishing Playbook Firewall Risk assessment Malware IOC (Indicator of Compromise) Alert fatigue Vulnerability scanning Threat intelligence Incident response Insider threat Zero- day attack Privileged access Red team Data breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SIEM (Security Information and Event Management)
Threat hunting
SOC analyst
Ransomware
Security posture
Endpoint detection
Forensic analysis
Lateral movement
Blue team
MITRE ATT&CK
Phishing
Playbook
Firewall
Risk assessment
Malware
IOC (Indicator of Compromise)
Alert fatigue
Vulnerability scanning
Threat intelligence
Incident response
Insider threat
Zero-day attack
Privileged access
Red team
Data breach