top of page

Cybersecurity Bingo

So many different buzzwords that it can make for a fun game of Bingo.

Guidelines and Considerations are as follows:


Spear phishing or regular works


​Switch or router-type infrastructure. Hub would also be a valid entry


A vendor brand such as Palo-Alto, or Cisco works as long as it is within the context of a firewall


The exact word needs to be used


Pen-testing or red-team can be considered valid entries


"Distributed denial of service" or just "denial of service" are valid entries


Should be used singular or plural


Malware, Ransomware, or the type of actual name of the malware are valid to complete this square


As it refers to network traffic, not the circumference of musicians


Likely to be used in the sense of threat actor, not the actor I saw on TV last night

​Nation state

Must be both words used (Nation-state) to complete the square. Using 'nation' on its own and then later using 'state' doesn't count

AI/Machine Learning

Any variants of Artificial intelligence or machine learning are valid entries, this also includes terms such as supervised or unsupervised neural networks

Free Space

Doesn't need to be said, but if someone says it then you know that you're on a roll with this group!


Intended in the context of threat-intelligence, not the computer chip maker. However, you could still complete the square and argue the process


​Policy, as it relates to business or rule policy, is fine. You may want to determine ahead of time if anything from governance is allowed to complete this square, such as NIST, ISO, etc.


Blocking is also a valid entry and may be used with a high scoring sentence such as 'I have blocked the threat actor'


The idea of proxying network connections, not having someone fill out your bingo card by proxy


As it relates to communication on the organization's TCP/IP network, whether intranet or internet-based. If used in the context of neural network then you should complete the AI/Machine Learning square


Typically related to a threat signature or firewall that governs how future occurrences are remediated


Recon or Reconnaissance is good to complete this square. However, recognizance or recognition are not


Ideally related to a bug tracking system, trouble ticketing system, or service ticketing system. If someone proclaims 'that's the ticket!' then you probably deserve to complete the square just for being in the same room as that person


Ideally related to network or software threats occurring within the organization. It could also be used in the context of an insider threat, which hopefully isn't anyone in the room with you right now


Pretty straightforward reference to the internet domain name servers, and likely used as part of a sentence, such as 'I did a DNS lookup on the domain'


Not of the tree kind, but of the kind typically aggregated from Windows, Linux, Active-Directory, Firewalls, or other such sources. The term 'Syslog' would be acceptable to complete this square

Sorry, was on mute

Something you're likely to hear on any internet-based communication software, such as Zoom, Webex, GoToMeeting, etc. Hopefully, never followed by the phrase "I'm not a cat"


Not on the actual bingo board, but an honorable mention here for my blatant attempt to get various cybersecurity keywords indexed

Subscribe and be the first to know!

Thanks for subscribing!

This form no longer accepts submissions.

bottom of page