LogMgmtSecurityResidency&ImplementManagediSensorIntrusionPreventionSystemManagedIDS/IPSManagedVulnScanningTargetedThreatIntelligenceTargetedThreatHuntingIncidentMgmt RiskAssessmentSecurityhealthcheckIncidentResponseWorkshop& ExerciseSecurity &RiskAssesmentSecurityArchitectureAssessmentPCIScanningManagedPolicyComplianceManagedFirewallMonitoredServerProtectionResponsePlanReview &Develop.BorderlessThreatMonitoringRedCloakGlobalThreatIntelligenceManagedAdvancedMalwareProtectionIncidentMgmtRetainerManagedWeb AppScanningAdvancedThreatServicesLogMgmtSecurityResidency&ImplementManagediSensorIntrusionPreventionSystemManagedIDS/IPSManagedVulnScanningTargetedThreatIntelligenceTargetedThreatHuntingIncidentMgmt RiskAssessmentSecurityhealthcheckIncidentResponseWorkshop& ExerciseSecurity &RiskAssesmentSecurityArchitectureAssessmentPCIScanningManagedPolicyComplianceManagedFirewallMonitoredServerProtectionResponsePlanReview &Develop.BorderlessThreatMonitoringRedCloakGlobalThreatIntelligenceManagedAdvancedMalwareProtectionIncidentMgmtRetainerManagedWeb AppScanningAdvancedThreatServices

Secureworks BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Log Mgmt
  2. Security Residency & Implement
  3. Managed iSensor Intrusion Prevention System
  4. Managed IDS/IPS
  5. Managed Vuln Scanning
  6. Targeted Threat Intelligence
  7. Targeted Threat Hunting
  8. Incident Mgmt Risk Assessment
  9. Security health check
  10. Incident Response Workshop & Exercise
  11. Security & Risk Assesment
  12. Security Architecture Assessment
  13. PCI Scanning
  14. Managed Policy Compliance
  15. Managed Firewall
  16. Monitored Server Protection
  17. Response Plan Review & Develop.
  18. Borderless Threat Monitoring
  19. Red Cloak
  20. Global Threat Intelligence
  21. Managed Advanced Malware Protection
  22. Incident Mgmt Retainer
  23. Managed Web App Scanning
  24. Advanced Threat Services