Managed iSensor Intrusion Prevention System Red Cloak Security Architecture Assessment Managed Firewall Security & Risk Assesment Global Threat Intelligence Log Mgmt Incident Mgmt Risk Assessment Monitored Server Protection PCI Scanning Targeted Threat Intelligence Incident Mgmt Retainer Security Residency & Implement Security health check Incident Response Workshop & Exercise Advanced Threat Services Managed Vuln Scanning Borderless Threat Monitoring Managed Web App Scanning Managed IDS/IPS Managed Advanced Malware Protection Targeted Threat Hunting Managed Policy Compliance Response Plan Review & Develop. Managed iSensor Intrusion Prevention System Red Cloak Security Architecture Assessment Managed Firewall Security & Risk Assesment Global Threat Intelligence Log Mgmt Incident Mgmt Risk Assessment Monitored Server Protection PCI Scanning Targeted Threat Intelligence Incident Mgmt Retainer Security Residency & Implement Security health check Incident Response Workshop & Exercise Advanced Threat Services Managed Vuln Scanning Borderless Threat Monitoring Managed Web App Scanning Managed IDS/IPS Managed Advanced Malware Protection Targeted Threat Hunting Managed Policy Compliance Response Plan Review & Develop.
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Managed iSensor Intrusion Prevention System
Red Cloak
Security Architecture Assessment
Managed Firewall
Security & Risk Assesment
Global Threat Intelligence
Log Mgmt
Incident Mgmt Risk Assessment
Monitored Server Protection
PCI Scanning
Targeted Threat Intelligence
Incident Mgmt Retainer
Security Residency & Implement
Security health check
Incident Response Workshop & Exercise
Advanced Threat Services
Managed Vuln
Scanning
Borderless Threat Monitoring
Managed Web App Scanning
Managed IDS/IPS
Managed Advanced Malware Protection
Targeted Threat Hunting
Managed Policy Compliance
Response Plan Review & Develop.