Zero Trust 2FA Threat Intelligence Penetration Test Sandbox Man- in-the- Middle Public Key SIEM Air Gap Yellow Team Password Social Media Risk Antivirus Blue Team SSL VPN Trojan Firewall Credential Stuffing Access Control Incident Response Spyware CISO Security Policy Whitelisting Dark Web Privilege Escalation BYOD Insider Threat Patch Encryption Shoulder Surfing Rootkit Multi-Factor Authentication Brute Force Botnet SQL Injection Cyberattack Blacklisting Malware Red Team IoT DDoS Clickjacking MITM Zero- Day Digital Forensics Security Token Patch Management Exploit Data Breach Phishing Session Hijacking Social Engineering Security Awareness Security Audit Ransomware Keylogger Cross- Site Scripting Private Key Cyber Hygiene Backdoor TLC Risk Assessment Zero Trust 2FA Threat Intelligence Penetration Test Sandbox Man- in-the- Middle Public Key SIEM Air Gap Yellow Team Password Social Media Risk Antivirus Blue Team SSL VPN Trojan Firewall Credential Stuffing Access Control Incident Response Spyware CISO Security Policy Whitelisting Dark Web Privilege Escalation BYOD Insider Threat Patch Encryption Shoulder Surfing Rootkit Multi-Factor Authentication Brute Force Botnet SQL Injection Cyberattack Blacklisting Malware Red Team IoT DDoS Clickjacking MITM Zero- Day Digital Forensics Security Token Patch Management Exploit Data Breach Phishing Session Hijacking Social Engineering Security Awareness Security Audit Ransomware Keylogger Cross- Site Scripting Private Key Cyber Hygiene Backdoor TLC Risk Assessment
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero Trust
2FA
Threat Intelligence
Penetration Test
Sandbox
Man-in-the-Middle
Public Key
SIEM
Air Gap
Yellow Team
Password
Social Media Risk
Antivirus
Blue Team
SSL
VPN
Trojan
Firewall
Credential Stuffing
Access Control
Incident Response
Spyware
CISO
Security Policy
Whitelisting
Dark Web
Privilege Escalation
BYOD
Insider Threat
Patch
Encryption
Shoulder Surfing
Rootkit
Multi-Factor Authentication
Brute Force
Botnet
SQL Injection
Cyberattack
Blacklisting
Malware
Red Team
IoT
DDoS
Clickjacking
MITM
Zero-Day
Digital Forensics
Security Token
Patch Management
Exploit
Data Breach
Phishing
Session Hijacking
Social Engineering
Security Awareness
Security Audit
Ransomware
Keylogger
Cross-Site Scripting
Private Key
Cyber Hygiene
Backdoor
TLC
Risk Assessment