Zero-dayattackThreatintelligenceRiskassessmentRedteamForensicanalysisInsiderthreatMITREATT&CKPhishingIOC(Indicator ofCompromise)BlueteamPrivilegedaccessMalwareVulnerabilityscanningSOCanalystThreathuntingPlaybookSIEM(SecurityInformationand EventManagement)IncidentresponseRansomwareEndpointdetectionAlertfatigueSecuritypostureLateralmovementDatabreachFirewallZero-dayattackThreatintelligenceRiskassessmentRedteamForensicanalysisInsiderthreatMITREATT&CKPhishingIOC(Indicator ofCompromise)BlueteamPrivilegedaccessMalwareVulnerabilityscanningSOCanalystThreathuntingPlaybookSIEM(SecurityInformationand EventManagement)IncidentresponseRansomwareEndpointdetectionAlertfatigueSecuritypostureLateralmovementDatabreachFirewall

Leading Ladies of the SOC BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Zero-day attack
  2. Threat intelligence
  3. Risk assessment
  4. Red team
  5. Forensic analysis
  6. Insider threat
  7. MITRE ATT&CK
  8. Phishing
  9. IOC (Indicator of Compromise)
  10. Blue team
  11. Privileged access
  12. Malware
  13. Vulnerability scanning
  14. SOC analyst
  15. Threat hunting
  16. Playbook
  17. SIEM (Security Information and Event Management)
  18. Incident response
  19. Ransomware
  20. Endpoint detection
  21. Alert fatigue
  22. Security posture
  23. Lateral movement
  24. Data breach
  25. Firewall