Protecting individual devices 6. Network, Email, Cloud, OT, identity & endpoint. Azure 9000+ The POD. Microsoft Coverage Areas 75% Block unauthorized access Cyber AI Analyst Intrusion Detection System Mclaren Car Pain point & next steps agreed. Natural History Museum Self-learning Artificial Intelligence (AI) 94% Chief Information Security Officer Network traffic, user behaviour Cambridge & San Francisco Economic Buyer ZoomInfo, MX look up Security Information and Event Management Fraudulent attempt to steal data usually via emails Implicate Pain Identifies unusual behaviours in real time Endpoint Detection & Response. Free! Right person, right company, held. Identify, indicate, Implicate. Extended detection & Response. Intrusion Prevention System. Malicious software demanding ransom Virtual Private Network Integrations Secure remote connections Security Information & Event management. Jon Gainey Self learning AI Identity & Asset Management. 2013 Covering the entire attack life cycle Jill Popelka Network Detection & Response. Sniping 2400+ 92% Bring Your Own Device Metrics 2 or 3 Autonomous Response Protecting individual devices 6. Network, Email, Cloud, OT, identity & endpoint. Azure 9000+ The POD. Microsoft Coverage Areas 75% Block unauthorized access Cyber AI Analyst Intrusion Detection System Mclaren Car Pain point & next steps agreed. Natural History Museum Self-learning Artificial Intelligence (AI) 94% Chief Information Security Officer Network traffic, user behaviour Cambridge & San Francisco Economic Buyer ZoomInfo, MX look up Security Information and Event Management Fraudulent attempt to steal data usually via emails Implicate Pain Identifies unusual behaviours in real time Endpoint Detection & Response. Free! Right person, right company, held. Identify, indicate, Implicate. Extended detection & Response. Intrusion Prevention System. Malicious software demanding ransom Virtual Private Network Integrations Secure remote connections Security Information & Event management. Jon Gainey Self learning AI Identity & Asset Management. 2013 Covering the entire attack life cycle Jill Popelka Network Detection & Response. Sniping 2400+ 92% Bring Your Own Device Metrics 2 or 3 Autonomous Response
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Protecting individual devices
6. Network, Email, Cloud, OT, identity & endpoint.
Azure
9000+
The POD.
Microsoft
Coverage Areas
75%
Block unauthorized access
Cyber AI Analyst
Intrusion Detection System
Mclaren Car
Pain point & next steps agreed.
Natural History Museum
Self-learning Artificial Intelligence (AI)
94%
Chief Information Security Officer
Network traffic, user behaviour
Cambridge & San Francisco
Economic Buyer
ZoomInfo, MX look up
Security Information and Event Management
Fraudulent attempt to steal data usually via emails
Implicate Pain
Identifies unusual behaviours in real time
Endpoint Detection & Response.
Free!
Right person, right company, held.
Identify, indicate, Implicate.
Extended detection & Response.
Intrusion Prevention System.
Malicious software demanding ransom
Virtual Private Network
Integrations
Secure remote connections
Security Information & Event management.
Jon Gainey
Self learning AI
Identity & Asset Management.
2013
Covering the entire attack life cycle
Jill Popelka
Network Detection & Response.
Sniping
2400+
92%
Bring Your Own Device
Metrics
2 or 3
Autonomous Response