CyberAIAnalystIdentity &AssetManagement.MicrosoftSnipingThePOD.Coveringthe entireattack lifecycleSelf-learningArtificialIntelligence(AI)Identify,indicate,Implicate.NaturalHistoryMuseumCoverageAreasPain point& nextstepsagreed.BringYour OwnDeviceImplicatePainEndpointDetection&Response.Identifiesunusualbehavioursin real timeSelflearningAIJonGaineyAutonomousResponseSecurityInformation &Eventmanagement.EconomicBuyer9000+VirtualPrivateNetwork6. Network,Email,Cloud, OT,identity &endpoint.Extendeddetection&Response.NetworkDetection&Response.ChiefInformationSecurityOfficerSecurityInformationand EventManagementIntrusionPreventionSystem.2 or3MetricsNetworktraffic,userbehaviour75%Free!Rightperson, rightcompany,held.IntegrationsMclarenCarAzureCambridge& SanFranciscoJillPopelkaIntrusionDetectionSystem94%Fraudulentattempt tosteal datausually viaemailsZoomInfo,MX lookup2013Protectingindividualdevices92%SecureremoteconnectionsMalicioussoftwaredemandingransomBlockunauthorizedaccess2400+CyberAIAnalystIdentity &AssetManagement.MicrosoftSnipingThePOD.Coveringthe entireattack lifecycleSelf-learningArtificialIntelligence(AI)Identify,indicate,Implicate.NaturalHistoryMuseumCoverageAreasPain point& nextstepsagreed.BringYour OwnDeviceImplicatePainEndpointDetection&Response.Identifiesunusualbehavioursin real timeSelflearningAIJonGaineyAutonomousResponseSecurityInformation &Eventmanagement.EconomicBuyer9000+VirtualPrivateNetwork6. Network,Email,Cloud, OT,identity &endpoint.Extendeddetection&Response.NetworkDetection&Response.ChiefInformationSecurityOfficerSecurityInformationand EventManagementIntrusionPreventionSystem.2 or3MetricsNetworktraffic,userbehaviour75%Free!Rightperson, rightcompany,held.IntegrationsMclarenCarAzureCambridge& SanFranciscoJillPopelkaIntrusionDetectionSystem94%Fraudulentattempt tosteal datausually viaemailsZoomInfo,MX lookup2013Protectingindividualdevices92%SecureremoteconnectionsMalicioussoftwaredemandingransomBlockunauthorizedaccess2400+

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Cyber AI Analyst
  2. Identity & Asset Management.
  3. Microsoft
  4. Sniping
  5. The POD.
  6. Covering the entire attack life cycle
  7. Self-learning Artificial Intelligence (AI)
  8. Identify, indicate, Implicate.
  9. Natural History Museum
  10. Coverage Areas
  11. Pain point & next steps agreed.
  12. Bring Your Own Device
  13. Implicate Pain
  14. Endpoint Detection & Response.
  15. Identifies unusual behaviours in real time
  16. Self learning AI
  17. Jon Gainey
  18. Autonomous Response
  19. Security Information & Event management.
  20. Economic Buyer
  21. 9000+
  22. Virtual Private Network
  23. 6. Network, Email, Cloud, OT, identity & endpoint.
  24. Extended detection & Response.
  25. Network Detection & Response.
  26. Chief Information Security Officer
  27. Security Information and Event Management
  28. Intrusion Prevention System.
  29. 2 or 3
  30. Metrics
  31. Network traffic, user behaviour
  32. 75%
  33. Free!
  34. Right person, right company, held.
  35. Integrations
  36. Mclaren Car
  37. Azure
  38. Cambridge & San Francisco
  39. Jill Popelka
  40. Intrusion Detection System
  41. 94%
  42. Fraudulent attempt to steal data usually via emails
  43. ZoomInfo, MX look up
  44. 2013
  45. Protecting individual devices
  46. 92%
  47. Secure remote connections
  48. Malicious software demanding ransom
  49. Block unauthorized access
  50. 2400+