So many different buzzwords that it can make for a fun game of Bingo.

Guidelines and Considerations are as follows:
Phishing | Spear phishing or regular works |
Switch/Router | Switch or router-type infrastructure. Hub would also be a valid entry |
Firewall | A vendor brand such as Palo-Alto, or Cisco works as long as it is within the context of a firewall |
Escalate | The exact word needs to be used |
Pen-test | Pen-testing or red-team can be considered valid entries |
D/DoS | "Distributed denial of service" or just "denial of service" are valid entries |
Tiger-team | Should be used singular or plural |
Malware | Malware, Ransomware, or the type of actual name of the malware are valid to complete this square |
Bandwidth | As it refers to network traffic, not the circumference of musicians |
Actor | Likely to be used in the sense of threat actor, not the actor I saw on TV last night |
Nation state | Must be both words used (Nation-state) to complete the square. Using 'nation' on its own and then later using 'state' doesn't count |
AI/Machine Learning | Any variants of Artificial intelligence or machine learning are valid entries, this also includes terms such as supervised or unsupervised neural networks |
Free Space | Doesn't need to be said, but if someone says it then you know that you're on a roll with this group! |
Intel | Intended in the context of threat-intelligence, not the computer chip maker. However, you could still complete the square and argue the process |
Policy | Policy, as it relates to business or rule policy, is fine. You may want to determine ahead of time if anything from governance is allowed to complete this square, such as NIST, ISO, etc. |
Blocked | Blocking is also a valid entry and may be used with a high scoring sentence such as 'I have blocked the threat actor' |
Proxy | The idea of proxying network connections, not having someone fill out your bingo card by proxy |
Network | As it relates to communication on the organization's TCP/IP network, whether intranet or internet-based. If used in the context of neural network then you should complete the AI/Machine Learning square |
Rule | Typically related to a threat signature or firewall that governs how future occurrences are remediated |
Recon | Recon or Reconnaissance is good to complete this square. However, recognizance or recognition are not |
Ticket | Ideally related to a bug tracking system, trouble ticketing system, or service ticketing system. If someone proclaims 'that's the ticket!' then you probably deserve to complete the square just for being in the same room as that person |
Threat | Ideally related to network or software threats occurring within the organization. It could also be used in the context of an insider threat, which hopefully isn't anyone in the room with you right now |
DNS | Pretty straightforward reference to the internet domain name servers, and likely used as part of a sentence, such as 'I did a DNS lookup on the domain' |
Logs | Not of the tree kind, but of the kind typically aggregated from Windows, Linux, Active-Directory, Firewalls, or other such sources. The term 'Syslog' would be acceptable to complete this square |
Sorry, was on mute | Something you're likely to hear on any internet-based communication software, such as Zoom, Webex, GoToMeeting, etc. Hopefully, never followed by the phrase "I'm not a cat" |
SEO | Not on the actual bingo board, but an honorable mention here for my blatant attempt to get various cybersecurity keywords indexed |