PrivilegedaccessEndpointdetectionMalwareInsiderthreatFirewallRedteamBlueteamSecuritypostureSIEM(SecurityInformationand EventManagement)ForensicanalysisMITREATT&CKPlaybookZero-dayattackSOCanalystPhishingIncidentresponseLateralmovementDatabreachAlertfatigueRansomwareRiskassessmentThreatintelligenceIOC(Indicator ofCompromise)VulnerabilityscanningThreathuntingPrivilegedaccessEndpointdetectionMalwareInsiderthreatFirewallRedteamBlueteamSecuritypostureSIEM(SecurityInformationand EventManagement)ForensicanalysisMITREATT&CKPlaybookZero-dayattackSOCanalystPhishingIncidentresponseLateralmovementDatabreachAlertfatigueRansomwareRiskassessmentThreatintelligenceIOC(Indicator ofCompromise)VulnerabilityscanningThreathunting

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Privileged access
  2. Endpoint detection
  3. Malware
  4. Insider threat
  5. Firewall
  6. Red team
  7. Blue team
  8. Security posture
  9. SIEM (Security Information and Event Management)
  10. Forensic analysis
  11. MITRE ATT&CK
  12. Playbook
  13. Zero-day attack
  14. SOC analyst
  15. Phishing
  16. Incident response
  17. Lateral movement
  18. Data breach
  19. Alert fatigue
  20. Ransomware
  21. Risk assessment
  22. Threat intelligence
  23. IOC (Indicator of Compromise)
  24. Vulnerability scanning
  25. Threat hunting