IncidentResponseWorkshop& ExerciseManagedWeb AppScanningLogMgmtAdvancedThreatServicesResponsePlanReview &Develop.PCIScanningManagediSensorIntrusionPreventionSystemSecurityResidency&ImplementManagedIDS/IPSBorderlessThreatMonitoringSecurity &RiskAssesmentManagedPolicyComplianceGlobalThreatIntelligenceIncidentMgmt RiskAssessmentManagedFirewallSecurityArchitectureAssessmentTargetedThreatHuntingManagedVulnScanningSecurityhealthcheckMonitoredServerProtectionTargetedThreatIntelligenceRedCloakIncidentMgmtRetainerManagedAdvancedMalwareProtectionIncidentResponseWorkshop& ExerciseManagedWeb AppScanningLogMgmtAdvancedThreatServicesResponsePlanReview &Develop.PCIScanningManagediSensorIntrusionPreventionSystemSecurityResidency&ImplementManagedIDS/IPSBorderlessThreatMonitoringSecurity &RiskAssesmentManagedPolicyComplianceGlobalThreatIntelligenceIncidentMgmt RiskAssessmentManagedFirewallSecurityArchitectureAssessmentTargetedThreatHuntingManagedVulnScanningSecurityhealthcheckMonitoredServerProtectionTargetedThreatIntelligenceRedCloakIncidentMgmtRetainerManagedAdvancedMalwareProtection

Secureworks BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Incident Response Workshop & Exercise
  2. Managed Web App Scanning
  3. Log Mgmt
  4. Advanced Threat Services
  5. Response Plan Review & Develop.
  6. PCI Scanning
  7. Managed iSensor Intrusion Prevention System
  8. Security Residency & Implement
  9. Managed IDS/IPS
  10. Borderless Threat Monitoring
  11. Security & Risk Assesment
  12. Managed Policy Compliance
  13. Global Threat Intelligence
  14. Incident Mgmt Risk Assessment
  15. Managed Firewall
  16. Security Architecture Assessment
  17. Targeted Threat Hunting
  18. Managed Vuln Scanning
  19. Security health check
  20. Monitored Server Protection
  21. Targeted Threat Intelligence
  22. Red Cloak
  23. Incident Mgmt Retainer
  24. Managed Advanced Malware Protection