Managed IDS/IPS Borderless Threat Monitoring Targeted Threat Hunting Security health check Security Architecture Assessment Targeted Threat Intelligence Incident Mgmt Risk Assessment Managed iSensor Intrusion Prevention System Security & Risk Assesment Managed Web App Scanning Security Residency & Implement Incident Response Workshop & Exercise Response Plan Review & Develop. Managed Advanced Malware Protection Advanced Threat Services Global Threat Intelligence Managed Firewall Log Mgmt Monitored Server Protection Managed Vuln Scanning Incident Mgmt Retainer PCI Scanning Managed Policy Compliance Red Cloak Managed IDS/IPS Borderless Threat Monitoring Targeted Threat Hunting Security health check Security Architecture Assessment Targeted Threat Intelligence Incident Mgmt Risk Assessment Managed iSensor Intrusion Prevention System Security & Risk Assesment Managed Web App Scanning Security Residency & Implement Incident Response Workshop & Exercise Response Plan Review & Develop. Managed Advanced Malware Protection Advanced Threat Services Global Threat Intelligence Managed Firewall Log Mgmt Monitored Server Protection Managed Vuln Scanning Incident Mgmt Retainer PCI Scanning Managed Policy Compliance Red Cloak
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Managed IDS/IPS
Borderless Threat Monitoring
Targeted Threat Hunting
Security health check
Security Architecture Assessment
Targeted Threat Intelligence
Incident Mgmt Risk Assessment
Managed iSensor Intrusion Prevention System
Security & Risk Assesment
Managed Web App Scanning
Security Residency & Implement
Incident Response Workshop & Exercise
Response Plan Review & Develop.
Managed Advanced Malware Protection
Advanced Threat Services
Global Threat Intelligence
Managed Firewall
Log Mgmt
Monitored Server Protection
Managed Vuln
Scanning
Incident Mgmt Retainer
PCI Scanning
Managed Policy Compliance
Red Cloak