ManagediSensorIntrusionPreventionSystemBorderlessThreatMonitoringResponsePlanReview &Develop.ManagedPolicyComplianceIncidentMgmt RiskAssessmentPCIScanningSecurityhealthcheckIncidentMgmtRetainerTargetedThreatIntelligenceManagedIDS/IPSSecurityResidency&ImplementManagedWeb AppScanningManagedFirewallIncidentResponseWorkshop& ExerciseMonitoredServerProtectionTargetedThreatHuntingAdvancedThreatServicesLogMgmtGlobalThreatIntelligenceRedCloakManagedAdvancedMalwareProtectionSecurityArchitectureAssessmentSecurity &RiskAssesmentManagedVulnScanningManagediSensorIntrusionPreventionSystemBorderlessThreatMonitoringResponsePlanReview &Develop.ManagedPolicyComplianceIncidentMgmt RiskAssessmentPCIScanningSecurityhealthcheckIncidentMgmtRetainerTargetedThreatIntelligenceManagedIDS/IPSSecurityResidency&ImplementManagedWeb AppScanningManagedFirewallIncidentResponseWorkshop& ExerciseMonitoredServerProtectionTargetedThreatHuntingAdvancedThreatServicesLogMgmtGlobalThreatIntelligenceRedCloakManagedAdvancedMalwareProtectionSecurityArchitectureAssessmentSecurity &RiskAssesmentManagedVulnScanning

Secureworks BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Managed iSensor Intrusion Prevention System
  2. Borderless Threat Monitoring
  3. Response Plan Review & Develop.
  4. Managed Policy Compliance
  5. Incident Mgmt Risk Assessment
  6. PCI Scanning
  7. Security health check
  8. Incident Mgmt Retainer
  9. Targeted Threat Intelligence
  10. Managed IDS/IPS
  11. Security Residency & Implement
  12. Managed Web App Scanning
  13. Managed Firewall
  14. Incident Response Workshop & Exercise
  15. Monitored Server Protection
  16. Targeted Threat Hunting
  17. Advanced Threat Services
  18. Log Mgmt
  19. Global Threat Intelligence
  20. Red Cloak
  21. Managed Advanced Malware Protection
  22. Security Architecture Assessment
  23. Security & Risk Assesment
  24. Managed Vuln Scanning