Security health check Managed Firewall Security Architecture Assessment Managed IDS/IPS Response Plan Review & Develop. Incident Mgmt Retainer Targeted Threat Intelligence Incident Response Workshop & Exercise Security Residency & Implement Security & Risk Assesment Log Mgmt Global Threat Intelligence Managed Policy Compliance Incident Mgmt Risk Assessment PCI Scanning Managed Web App Scanning Monitored Server Protection Managed iSensor Intrusion Prevention System Red Cloak Managed Advanced Malware Protection Borderless Threat Monitoring Advanced Threat Services Targeted Threat Hunting Managed Vuln Scanning Security health check Managed Firewall Security Architecture Assessment Managed IDS/IPS Response Plan Review & Develop. Incident Mgmt Retainer Targeted Threat Intelligence Incident Response Workshop & Exercise Security Residency & Implement Security & Risk Assesment Log Mgmt Global Threat Intelligence Managed Policy Compliance Incident Mgmt Risk Assessment PCI Scanning Managed Web App Scanning Monitored Server Protection Managed iSensor Intrusion Prevention System Red Cloak Managed Advanced Malware Protection Borderless Threat Monitoring Advanced Threat Services Targeted Threat Hunting Managed Vuln Scanning
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security health check
Managed Firewall
Security Architecture Assessment
Managed IDS/IPS
Response Plan Review & Develop.
Incident Mgmt Retainer
Targeted Threat Intelligence
Incident Response Workshop & Exercise
Security Residency & Implement
Security & Risk Assesment
Log Mgmt
Global Threat Intelligence
Managed Policy Compliance
Incident Mgmt Risk Assessment
PCI Scanning
Managed Web App Scanning
Monitored Server Protection
Managed iSensor Intrusion Prevention System
Red Cloak
Managed Advanced Malware Protection
Borderless Threat Monitoring
Advanced Threat Services
Targeted Threat Hunting
Managed Vuln
Scanning