ManagediSensorIntrusionPreventionSystemRedCloakSecurityArchitectureAssessmentManagedFirewallSecurity &RiskAssesmentGlobalThreatIntelligenceLogMgmtIncidentMgmt RiskAssessmentMonitoredServerProtectionPCIScanningTargetedThreatIntelligenceIncidentMgmtRetainerSecurityResidency&ImplementSecurityhealthcheckIncidentResponseWorkshop& ExerciseAdvancedThreatServicesManagedVulnScanningBorderlessThreatMonitoringManagedWeb AppScanningManagedIDS/IPSManagedAdvancedMalwareProtectionTargetedThreatHuntingManagedPolicyComplianceResponsePlanReview &Develop.ManagediSensorIntrusionPreventionSystemRedCloakSecurityArchitectureAssessmentManagedFirewallSecurity &RiskAssesmentGlobalThreatIntelligenceLogMgmtIncidentMgmt RiskAssessmentMonitoredServerProtectionPCIScanningTargetedThreatIntelligenceIncidentMgmtRetainerSecurityResidency&ImplementSecurityhealthcheckIncidentResponseWorkshop& ExerciseAdvancedThreatServicesManagedVulnScanningBorderlessThreatMonitoringManagedWeb AppScanningManagedIDS/IPSManagedAdvancedMalwareProtectionTargetedThreatHuntingManagedPolicyComplianceResponsePlanReview &Develop.

Secureworks BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Managed iSensor Intrusion Prevention System
  2. Red Cloak
  3. Security Architecture Assessment
  4. Managed Firewall
  5. Security & Risk Assesment
  6. Global Threat Intelligence
  7. Log Mgmt
  8. Incident Mgmt Risk Assessment
  9. Monitored Server Protection
  10. PCI Scanning
  11. Targeted Threat Intelligence
  12. Incident Mgmt Retainer
  13. Security Residency & Implement
  14. Security health check
  15. Incident Response Workshop & Exercise
  16. Advanced Threat Services
  17. Managed Vuln Scanning
  18. Borderless Threat Monitoring
  19. Managed Web App Scanning
  20. Managed IDS/IPS
  21. Managed Advanced Malware Protection
  22. Targeted Threat Hunting
  23. Managed Policy Compliance
  24. Response Plan Review & Develop.