MetricsIntrusionDetectionSystemIdentify,indicate,Implicate.Self-learningArtificialIntelligence(AI)VirtualPrivateNetworkPain point& nextstepsagreed.Identity &AssetManagement.2013NetworkDetection&Response.Identifiesunusualbehavioursin real timeMicrosoftIntrusionPreventionSystem.ProtectingindividualdevicesBlockunauthorizedaccessSecureremoteconnections2400+9000+2 or3EconomicBuyerSelflearningAIBringYour OwnDeviceJillPopelkaFree!SecurityInformationand EventManagementFraudulentattempt tosteal datausually viaemailsEndpointDetection&Response.ImplicatePainZoomInfo,MX lookup75%AutonomousResponseAzure6. Network,Email,Cloud, OT,identity &endpoint.CyberAIAnalystCoveringthe entireattack lifecycleNetworktraffic,userbehaviourThePOD.NaturalHistoryMuseumMalicioussoftwaredemandingransom92%94%ChiefInformationSecurityOfficerCoverageAreasRightperson, rightcompany,held.IntegrationsCambridge& SanFranciscoSnipingSecurityInformation &Eventmanagement.JonGaineyExtendeddetection&Response.MclarenCarMetricsIntrusionDetectionSystemIdentify,indicate,Implicate.Self-learningArtificialIntelligence(AI)VirtualPrivateNetworkPain point& nextstepsagreed.Identity &AssetManagement.2013NetworkDetection&Response.Identifiesunusualbehavioursin real timeMicrosoftIntrusionPreventionSystem.ProtectingindividualdevicesBlockunauthorizedaccessSecureremoteconnections2400+9000+2 or3EconomicBuyerSelflearningAIBringYour OwnDeviceJillPopelkaFree!SecurityInformationand EventManagementFraudulentattempt tosteal datausually viaemailsEndpointDetection&Response.ImplicatePainZoomInfo,MX lookup75%AutonomousResponseAzure6. Network,Email,Cloud, OT,identity &endpoint.CyberAIAnalystCoveringthe entireattack lifecycleNetworktraffic,userbehaviourThePOD.NaturalHistoryMuseumMalicioussoftwaredemandingransom92%94%ChiefInformationSecurityOfficerCoverageAreasRightperson, rightcompany,held.IntegrationsCambridge& SanFranciscoSnipingSecurityInformation &Eventmanagement.JonGaineyExtendeddetection&Response.MclarenCar

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Metrics
  2. Intrusion Detection System
  3. Identify, indicate, Implicate.
  4. Self-learning Artificial Intelligence (AI)
  5. Virtual Private Network
  6. Pain point & next steps agreed.
  7. Identity & Asset Management.
  8. 2013
  9. Network Detection & Response.
  10. Identifies unusual behaviours in real time
  11. Microsoft
  12. Intrusion Prevention System.
  13. Protecting individual devices
  14. Block unauthorized access
  15. Secure remote connections
  16. 2400+
  17. 9000+
  18. 2 or 3
  19. Economic Buyer
  20. Self learning AI
  21. Bring Your Own Device
  22. Jill Popelka
  23. Free!
  24. Security Information and Event Management
  25. Fraudulent attempt to steal data usually via emails
  26. Endpoint Detection & Response.
  27. Implicate Pain
  28. ZoomInfo, MX look up
  29. 75%
  30. Autonomous Response
  31. Azure
  32. 6. Network, Email, Cloud, OT, identity & endpoint.
  33. Cyber AI Analyst
  34. Covering the entire attack life cycle
  35. Network traffic, user behaviour
  36. The POD.
  37. Natural History Museum
  38. Malicious software demanding ransom
  39. 92%
  40. 94%
  41. Chief Information Security Officer
  42. Coverage Areas
  43. Right person, right company, held.
  44. Integrations
  45. Cambridge & San Francisco
  46. Sniping
  47. Security Information & Event management.
  48. Jon Gainey
  49. Extended detection & Response.
  50. Mclaren Car