Endpoint detection Vulnerability scanning Security posture Privileged access Lateral movement MITRE ATT&CK Alert fatigue SOC analyst Phishing Data breach Risk assessment Forensic analysis Malware Threat intelligence Ransomware Red team Playbook Blue team Zero- day attack IOC (Indicator of Compromise) Firewall Incident response SIEM (Security Information and Event Management) Insider threat Threat hunting Endpoint detection Vulnerability scanning Security posture Privileged access Lateral movement MITRE ATT&CK Alert fatigue SOC analyst Phishing Data breach Risk assessment Forensic analysis Malware Threat intelligence Ransomware Red team Playbook Blue team Zero- day attack IOC (Indicator of Compromise) Firewall Incident response SIEM (Security Information and Event Management) Insider threat Threat hunting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint detection
Vulnerability scanning
Security posture
Privileged access
Lateral movement
MITRE ATT&CK
Alert fatigue
SOC analyst
Phishing
Data breach
Risk assessment
Forensic analysis
Malware
Threat intelligence
Ransomware
Red team
Playbook
Blue team
Zero-day attack
IOC (Indicator of Compromise)
Firewall
Incident response
SIEM (Security Information and Event Management)
Insider threat
Threat hunting