SecurityhealthcheckManagedFirewallSecurityArchitectureAssessmentManagedIDS/IPSResponsePlanReview &Develop.IncidentMgmtRetainerTargetedThreatIntelligenceIncidentResponseWorkshop& ExerciseSecurityResidency&ImplementSecurity &RiskAssesmentLogMgmtGlobalThreatIntelligenceManagedPolicyComplianceIncidentMgmt RiskAssessmentPCIScanningManagedWeb AppScanningMonitoredServerProtectionManagediSensorIntrusionPreventionSystemRedCloakManagedAdvancedMalwareProtectionBorderlessThreatMonitoringAdvancedThreatServicesTargetedThreatHuntingManagedVulnScanningSecurityhealthcheckManagedFirewallSecurityArchitectureAssessmentManagedIDS/IPSResponsePlanReview &Develop.IncidentMgmtRetainerTargetedThreatIntelligenceIncidentResponseWorkshop& ExerciseSecurityResidency&ImplementSecurity &RiskAssesmentLogMgmtGlobalThreatIntelligenceManagedPolicyComplianceIncidentMgmt RiskAssessmentPCIScanningManagedWeb AppScanningMonitoredServerProtectionManagediSensorIntrusionPreventionSystemRedCloakManagedAdvancedMalwareProtectionBorderlessThreatMonitoringAdvancedThreatServicesTargetedThreatHuntingManagedVulnScanning

Secureworks BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Security health check
  2. Managed Firewall
  3. Security Architecture Assessment
  4. Managed IDS/IPS
  5. Response Plan Review & Develop.
  6. Incident Mgmt Retainer
  7. Targeted Threat Intelligence
  8. Incident Response Workshop & Exercise
  9. Security Residency & Implement
  10. Security & Risk Assesment
  11. Log Mgmt
  12. Global Threat Intelligence
  13. Managed Policy Compliance
  14. Incident Mgmt Risk Assessment
  15. PCI Scanning
  16. Managed Web App Scanning
  17. Monitored Server Protection
  18. Managed iSensor Intrusion Prevention System
  19. Red Cloak
  20. Managed Advanced Malware Protection
  21. Borderless Threat Monitoring
  22. Advanced Threat Services
  23. Targeted Threat Hunting
  24. Managed Vuln Scanning