CorporateEspionageISACsSTIXRevengeAttacksPhilosophical-Political BeliefAttacksThreatIntelligenceBlackmailAttacksOrganizedCrimeAttackersOSINTServiceDisruptionAttacksDisruption-ChaosAttacksPredictiveAnalysisIoCsWhite-HatHackersShadowITThreatMapsThreatVectorsEthicalAttacksClosed-SourceIntelligenceZero-DayAttacksNation-StateAttackersGray-HatHackersHacktivistsScriptKiddieBlack-HatHackersEspionageAttacksAPTsInsiderThreatTTPsVulnerabilityDatabasesFinancialGainAttacksDarkWebFree!DataExfiltrationAttacksThreatActorsWarAttacksAttackSurfacesCorporateEspionageISACsSTIXRevengeAttacksPhilosophical-Political BeliefAttacksThreatIntelligenceBlackmailAttacksOrganizedCrimeAttackersOSINTServiceDisruptionAttacksDisruption-ChaosAttacksPredictiveAnalysisIoCsWhite-HatHackersShadowITThreatMapsThreatVectorsEthicalAttacksClosed-SourceIntelligenceZero-DayAttacksNation-StateAttackersGray-HatHackersHacktivistsScriptKiddieBlack-HatHackersEspionageAttacksAPTsInsiderThreatTTPsVulnerabilityDatabasesFinancialGainAttacksDarkWebFree!DataExfiltrationAttacksThreatActorsWarAttacksAttackSurfaces

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Corporate Espionage
  2. ISACs
  3. STIX
  4. Revenge Attacks
  5. Philosophical-Political Belief Attacks
  6. Threat Intelligence
  7. Blackmail Attacks
  8. Organized Crime Attackers
  9. OSINT
  10. Service Disruption Attacks
  11. Disruption-Chaos Attacks
  12. Predictive Analysis
  13. IoCs
  14. White-Hat Hackers
  15. Shadow IT
  16. Threat Maps
  17. Threat Vectors
  18. Ethical Attacks
  19. Closed-Source Intelligence
  20. Zero-Day Attacks
  21. Nation-State Attackers
  22. Gray-Hat Hackers
  23. Hacktivists
  24. Script Kiddie
  25. Black-Hat Hackers
  26. Espionage Attacks
  27. APTs
  28. Insider Threat
  29. TTPs
  30. Vulnerability Databases
  31. Financial Gain Attacks
  32. Dark Web
  33. Free!
  34. Data Exfiltration Attacks
  35. Threat Actors
  36. War Attacks
  37. Attack Surfaces