Resilience Risk assessment Adaptability Alert fatigue Influence Security posture Breaking barriers SIEM (Security Information and Event Management) Insider threat Threat hunting Forensic analysis Phishing Strength Malware Inspire Data breach Threat intelligence Firewall Leading by example Bold decisions Vulnerability scanning Inclusion SOC analyst Trailblazer Privileged access Visionary Collaboration Growth mindset Legacy MITRE ATT&CK Confidence Empowerment Purpose- driven Zero- day attack Ransomware Innovation Strategic thinking Incident response Endpoint detection Mentorship Resilience Risk assessment Adaptability Alert fatigue Influence Security posture Breaking barriers SIEM (Security Information and Event Management) Insider threat Threat hunting Forensic analysis Phishing Strength Malware Inspire Data breach Threat intelligence Firewall Leading by example Bold decisions Vulnerability scanning Inclusion SOC analyst Trailblazer Privileged access Visionary Collaboration Growth mindset Legacy MITRE ATT&CK Confidence Empowerment Purpose- driven Zero- day attack Ransomware Innovation Strategic thinking Incident response Endpoint detection Mentorship
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Resilience
Risk assessment
Adaptability
Alert fatigue
Influence
Security posture
Breaking barriers
SIEM (Security Information and Event Management)
Insider threat
Threat hunting
Forensic analysis
Phishing
Strength
Malware
Inspire
Data breach
Threat intelligence
Firewall
Leading by example
Bold decisions
Vulnerability scanning
Inclusion
SOC analyst
Trailblazer
Privileged access
Visionary
Collaboration
Growth mindset
Legacy
MITRE ATT&CK
Confidence
Empowerment
Purpose-driven
Zero-day attack
Ransomware
Innovation
Strategic thinking
Incident response
Endpoint detection
Mentorship