AutonomousResponseSelf-learningArtificialIntelligence(AI)SnipingIntrusionPreventionSystem.EconomicBuyerJonGaineyCyberAIAnalystNaturalHistoryMuseumSecureremoteconnectionsCoveringthe entireattack lifecycle2013Blockunauthorizedaccess94%9000+Free!IntrusionDetectionSystemMclarenCarJillPopelkaIdentity &AssetManagement.IntegrationsMalicioussoftwaredemandingransomFraudulentattempt tosteal datausually viaemails75%MicrosoftAzureIdentify,indicate,Implicate.ProtectingindividualdevicesRightperson, rightcompany,held.NetworkDetection&Response.ChiefInformationSecurityOfficerIdentifiesunusualbehavioursin real time2 or3ImplicatePainMetrics2400+SelflearningAIPain point& nextstepsagreed.CoverageAreasSecurityInformationand EventManagement6. Network,Email,Cloud, OT,identity &endpoint.92%Extendeddetection&Response.Networktraffic,userbehaviourSecurityInformation &Eventmanagement.Cambridge& SanFranciscoBringYour OwnDeviceVirtualPrivateNetworkZoomInfo,MX lookupEndpointDetection&Response.ThePOD.AutonomousResponseSelf-learningArtificialIntelligence(AI)SnipingIntrusionPreventionSystem.EconomicBuyerJonGaineyCyberAIAnalystNaturalHistoryMuseumSecureremoteconnectionsCoveringthe entireattack lifecycle2013Blockunauthorizedaccess94%9000+Free!IntrusionDetectionSystemMclarenCarJillPopelkaIdentity &AssetManagement.IntegrationsMalicioussoftwaredemandingransomFraudulentattempt tosteal datausually viaemails75%MicrosoftAzureIdentify,indicate,Implicate.ProtectingindividualdevicesRightperson, rightcompany,held.NetworkDetection&Response.ChiefInformationSecurityOfficerIdentifiesunusualbehavioursin real time2 or3ImplicatePainMetrics2400+SelflearningAIPain point& nextstepsagreed.CoverageAreasSecurityInformationand EventManagement6. Network,Email,Cloud, OT,identity &endpoint.92%Extendeddetection&Response.Networktraffic,userbehaviourSecurityInformation &Eventmanagement.Cambridge& SanFranciscoBringYour OwnDeviceVirtualPrivateNetworkZoomInfo,MX lookupEndpointDetection&Response.ThePOD.

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Autonomous Response
  2. Self-learning Artificial Intelligence (AI)
  3. Sniping
  4. Intrusion Prevention System.
  5. Economic Buyer
  6. Jon Gainey
  7. Cyber AI Analyst
  8. Natural History Museum
  9. Secure remote connections
  10. Covering the entire attack life cycle
  11. 2013
  12. Block unauthorized access
  13. 94%
  14. 9000+
  15. Free!
  16. Intrusion Detection System
  17. Mclaren Car
  18. Jill Popelka
  19. Identity & Asset Management.
  20. Integrations
  21. Malicious software demanding ransom
  22. Fraudulent attempt to steal data usually via emails
  23. 75%
  24. Microsoft
  25. Azure
  26. Identify, indicate, Implicate.
  27. Protecting individual devices
  28. Right person, right company, held.
  29. Network Detection & Response.
  30. Chief Information Security Officer
  31. Identifies unusual behaviours in real time
  32. 2 or 3
  33. Implicate Pain
  34. Metrics
  35. 2400+
  36. Self learning AI
  37. Pain point & next steps agreed.
  38. Coverage Areas
  39. Security Information and Event Management
  40. 6. Network, Email, Cloud, OT, identity & endpoint.
  41. 92%
  42. Extended detection & Response.
  43. Network traffic, user behaviour
  44. Security Information & Event management.
  45. Cambridge & San Francisco
  46. Bring Your Own Device
  47. Virtual Private Network
  48. ZoomInfo, MX look up
  49. Endpoint Detection & Response.
  50. The POD.