ThreatMapsPredictiveAnalysisDataExfiltrationAttacksWarAttacksThreatVectorsIoCsVulnerabilityDatabasesNation-StateAttackersWhite-HatHackersOSINTServiceDisruptionAttacksShadowITPhilosophical-Political BeliefAttacksEthicalAttacksDarkWebScriptKiddieZero-DayAttacksOrganizedCrimeAttackersDisruption-ChaosAttacksAPTsISACsCorporateEspionageSTIXEspionageAttacksGray-HatHackersThreatIntelligenceThreatActorsBlackmailAttacksHacktivistsFinancialGainAttacksFree!Black-HatHackersRevengeAttacksAttackSurfacesTTPsClosed-SourceIntelligenceInsiderThreatThreatMapsPredictiveAnalysisDataExfiltrationAttacksWarAttacksThreatVectorsIoCsVulnerabilityDatabasesNation-StateAttackersWhite-HatHackersOSINTServiceDisruptionAttacksShadowITPhilosophical-Political BeliefAttacksEthicalAttacksDarkWebScriptKiddieZero-DayAttacksOrganizedCrimeAttackersDisruption-ChaosAttacksAPTsISACsCorporateEspionageSTIXEspionageAttacksGray-HatHackersThreatIntelligenceThreatActorsBlackmailAttacksHacktivistsFinancialGainAttacksFree!Black-HatHackersRevengeAttacksAttackSurfacesTTPsClosed-SourceIntelligenceInsiderThreat

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Threat Maps
  2. Predictive Analysis
  3. Data Exfiltration Attacks
  4. War Attacks
  5. Threat Vectors
  6. IoCs
  7. Vulnerability Databases
  8. Nation-State Attackers
  9. White-Hat Hackers
  10. OSINT
  11. Service Disruption Attacks
  12. Shadow IT
  13. Philosophical-Political Belief Attacks
  14. Ethical Attacks
  15. Dark Web
  16. Script Kiddie
  17. Zero-Day Attacks
  18. Organized Crime Attackers
  19. Disruption-Chaos Attacks
  20. APTs
  21. ISACs
  22. Corporate Espionage
  23. STIX
  24. Espionage Attacks
  25. Gray-Hat Hackers
  26. Threat Intelligence
  27. Threat Actors
  28. Blackmail Attacks
  29. Hacktivists
  30. Financial Gain Attacks
  31. Free!
  32. Black-Hat Hackers
  33. Revenge Attacks
  34. Attack Surfaces
  35. TTPs
  36. Closed-Source Intelligence
  37. Insider Threat