ManagedPolicyComplianceGlobalThreatIntelligenceManagedAdvancedMalwareProtectionRedCloakIncidentMgmtRetainerIncidentMgmt RiskAssessmentManagediSensorIntrusionPreventionSystemPCIScanningAdvancedThreatServicesResponsePlanReview &Develop.ManagedFirewallSecurity &RiskAssesmentManagedIDS/IPSManagedWeb AppScanningManagedVulnScanningMonitoredServerProtectionSecurityArchitectureAssessmentBorderlessThreatMonitoringLogMgmtTargetedThreatHuntingSecurityResidency&ImplementTargetedThreatIntelligenceIncidentResponseWorkshop& ExerciseSecurityhealthcheckManagedPolicyComplianceGlobalThreatIntelligenceManagedAdvancedMalwareProtectionRedCloakIncidentMgmtRetainerIncidentMgmt RiskAssessmentManagediSensorIntrusionPreventionSystemPCIScanningAdvancedThreatServicesResponsePlanReview &Develop.ManagedFirewallSecurity &RiskAssesmentManagedIDS/IPSManagedWeb AppScanningManagedVulnScanningMonitoredServerProtectionSecurityArchitectureAssessmentBorderlessThreatMonitoringLogMgmtTargetedThreatHuntingSecurityResidency&ImplementTargetedThreatIntelligenceIncidentResponseWorkshop& ExerciseSecurityhealthcheck

Secureworks BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Managed Policy Compliance
  2. Global Threat Intelligence
  3. Managed Advanced Malware Protection
  4. Red Cloak
  5. Incident Mgmt Retainer
  6. Incident Mgmt Risk Assessment
  7. Managed iSensor Intrusion Prevention System
  8. PCI Scanning
  9. Advanced Threat Services
  10. Response Plan Review & Develop.
  11. Managed Firewall
  12. Security & Risk Assesment
  13. Managed IDS/IPS
  14. Managed Web App Scanning
  15. Managed Vuln Scanning
  16. Monitored Server Protection
  17. Security Architecture Assessment
  18. Borderless Threat Monitoring
  19. Log Mgmt
  20. Targeted Threat Hunting
  21. Security Residency & Implement
  22. Targeted Threat Intelligence
  23. Incident Response Workshop & Exercise
  24. Security health check