Managed iSensor Intrusion Prevention System Borderless Threat Monitoring Response Plan Review & Develop. Managed Policy Compliance Incident Mgmt Risk Assessment PCI Scanning Security health check Incident Mgmt Retainer Targeted Threat Intelligence Managed IDS/IPS Security Residency & Implement Managed Web App Scanning Managed Firewall Incident Response Workshop & Exercise Monitored Server Protection Targeted Threat Hunting Advanced Threat Services Log Mgmt Global Threat Intelligence Red Cloak Managed Advanced Malware Protection Security Architecture Assessment Security & Risk Assesment Managed Vuln Scanning Managed iSensor Intrusion Prevention System Borderless Threat Monitoring Response Plan Review & Develop. Managed Policy Compliance Incident Mgmt Risk Assessment PCI Scanning Security health check Incident Mgmt Retainer Targeted Threat Intelligence Managed IDS/IPS Security Residency & Implement Managed Web App Scanning Managed Firewall Incident Response Workshop & Exercise Monitored Server Protection Targeted Threat Hunting Advanced Threat Services Log Mgmt Global Threat Intelligence Red Cloak Managed Advanced Malware Protection Security Architecture Assessment Security & Risk Assesment Managed Vuln Scanning
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Managed iSensor Intrusion Prevention System
Borderless Threat Monitoring
Response Plan Review & Develop.
Managed Policy Compliance
Incident Mgmt Risk Assessment
PCI Scanning
Security health check
Incident Mgmt Retainer
Targeted Threat Intelligence
Managed IDS/IPS
Security Residency & Implement
Managed Web App Scanning
Managed Firewall
Incident Response Workshop & Exercise
Monitored Server Protection
Targeted Threat Hunting
Advanced Threat Services
Log Mgmt
Global Threat Intelligence
Red Cloak
Managed Advanced Malware Protection
Security Architecture Assessment
Security & Risk Assesment
Managed Vuln
Scanning