Visionary Inspire Breaking barriers Zero- day attack Trailblazer Strategic thinking Vulnerability scanning Mentorship Threat hunting Privileged access Confidence SIEM (Security Information and Event Management) SOC analyst Empowerment Firewall Influence Incident response Purpose- driven Growth mindset Alert fatigue Phishing Endpoint detection Resilience Data breach Leading by example Forensic analysis Collaboration MITRE ATT&CK Legacy Innovation Insider threat Inclusion Security posture Strength Threat intelligence Ransomware Bold decisions Risk assessment Adaptability Malware Visionary Inspire Breaking barriers Zero- day attack Trailblazer Strategic thinking Vulnerability scanning Mentorship Threat hunting Privileged access Confidence SIEM (Security Information and Event Management) SOC analyst Empowerment Firewall Influence Incident response Purpose- driven Growth mindset Alert fatigue Phishing Endpoint detection Resilience Data breach Leading by example Forensic analysis Collaboration MITRE ATT&CK Legacy Innovation Insider threat Inclusion Security posture Strength Threat intelligence Ransomware Bold decisions Risk assessment Adaptability Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Visionary
Inspire
Breaking barriers
Zero-day attack
Trailblazer
Strategic thinking
Vulnerability scanning
Mentorship
Threat hunting
Privileged access
Confidence
SIEM (Security Information and Event Management)
SOC analyst
Empowerment
Firewall
Influence
Incident response
Purpose-driven
Growth mindset
Alert fatigue
Phishing
Endpoint detection
Resilience
Data breach
Leading by example
Forensic analysis
Collaboration
MITRE ATT&CK
Legacy
Innovation
Insider threat
Inclusion
Security posture
Strength
Threat intelligence
Ransomware
Bold decisions
Risk assessment
Adaptability
Malware