Strategic thinking Innovation Bold decisions Threat intelligence Strength Insider threat Trailblazer Vulnerability scanning SOC analyst Zero- day attack Breaking barriers MITRE ATT&CK Inclusion Malware Incident response Confidence Collaboration Growth mindset Leading by example Empowerment Forensic analysis Alert fatigue Endpoint detection Purpose- driven Risk assessment Firewall Mentorship Privileged access Data breach Legacy Security posture Adaptability SIEM (Security Information and Event Management) Visionary Resilience Influence Ransomware Phishing Threat hunting Inspire Strategic thinking Innovation Bold decisions Threat intelligence Strength Insider threat Trailblazer Vulnerability scanning SOC analyst Zero- day attack Breaking barriers MITRE ATT&CK Inclusion Malware Incident response Confidence Collaboration Growth mindset Leading by example Empowerment Forensic analysis Alert fatigue Endpoint detection Purpose- driven Risk assessment Firewall Mentorship Privileged access Data breach Legacy Security posture Adaptability SIEM (Security Information and Event Management) Visionary Resilience Influence Ransomware Phishing Threat hunting Inspire
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Strategic thinking
Innovation
Bold decisions
Threat intelligence
Strength
Insider threat
Trailblazer
Vulnerability scanning
SOC analyst
Zero-day attack
Breaking barriers
MITRE ATT&CK
Inclusion
Malware
Incident response
Confidence
Collaboration
Growth mindset
Leading by example
Empowerment
Forensic analysis
Alert fatigue
Endpoint detection
Purpose-driven
Risk assessment
Firewall
Mentorship
Privileged access
Data breach
Legacy
Security posture
Adaptability
SIEM (Security Information and Event Management)
Visionary
Resilience
Influence
Ransomware
Phishing
Threat hunting
Inspire