Purpose- driven Confidence Strength Phishing Malware Resilience MITRE ATT&CK Endpoint detection Forensic analysis Bold decisions Threat intelligence Strategic thinking Empowerment Innovation Influence SOC analyst Inclusion Vulnerability scanning Inspire Growth mindset Incident response Insider threat Alert fatigue Collaboration Legacy SIEM (Security Information and Event Management) Firewall Threat hunting Trailblazer Adaptability Risk assessment Ransomware Visionary Security posture Breaking barriers Privileged access Zero- day attack Mentorship Leading by example Data breach Purpose- driven Confidence Strength Phishing Malware Resilience MITRE ATT&CK Endpoint detection Forensic analysis Bold decisions Threat intelligence Strategic thinking Empowerment Innovation Influence SOC analyst Inclusion Vulnerability scanning Inspire Growth mindset Incident response Insider threat Alert fatigue Collaboration Legacy SIEM (Security Information and Event Management) Firewall Threat hunting Trailblazer Adaptability Risk assessment Ransomware Visionary Security posture Breaking barriers Privileged access Zero- day attack Mentorship Leading by example Data breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Purpose-driven
Confidence
Strength
Phishing
Malware
Resilience
MITRE ATT&CK
Endpoint detection
Forensic analysis
Bold decisions
Threat intelligence
Strategic thinking
Empowerment
Innovation
Influence
SOC analyst
Inclusion
Vulnerability scanning
Inspire
Growth mindset
Incident response
Insider threat
Alert fatigue
Collaboration
Legacy
SIEM (Security Information and Event Management)
Firewall
Threat hunting
Trailblazer
Adaptability
Risk assessment
Ransomware
Visionary
Security posture
Breaking barriers
Privileged access
Zero-day attack
Mentorship
Leading by example
Data breach