Cyber AI Analyst Identity & Asset Management. Microsoft Sniping The POD. Covering the entire attack life cycle Self-learning Artificial Intelligence (AI) Identify, indicate, Implicate. Natural History Museum Coverage Areas Pain point & next steps agreed. Bring Your Own Device Implicate Pain Endpoint Detection & Response. Identifies unusual behaviours in real time Self learning AI Jon Gainey Autonomous Response Security Information & Event management. Economic Buyer 9000+ Virtual Private Network 6. Network, Email, Cloud, OT, identity & endpoint. Extended detection & Response. Network Detection & Response. Chief Information Security Officer Security Information and Event Management Intrusion Prevention System. 2 or 3 Metrics Network traffic, user behaviour 75% Free! Right person, right company, held. Integrations Mclaren Car Azure Cambridge & San Francisco Jill Popelka Intrusion Detection System 94% Fraudulent attempt to steal data usually via emails ZoomInfo, MX look up 2013 Protecting individual devices 92% Secure remote connections Malicious software demanding ransom Block unauthorized access 2400+ Cyber AI Analyst Identity & Asset Management. Microsoft Sniping The POD. Covering the entire attack life cycle Self-learning Artificial Intelligence (AI) Identify, indicate, Implicate. Natural History Museum Coverage Areas Pain point & next steps agreed. Bring Your Own Device Implicate Pain Endpoint Detection & Response. Identifies unusual behaviours in real time Self learning AI Jon Gainey Autonomous Response Security Information & Event management. Economic Buyer 9000+ Virtual Private Network 6. Network, Email, Cloud, OT, identity & endpoint. Extended detection & Response. Network Detection & Response. Chief Information Security Officer Security Information and Event Management Intrusion Prevention System. 2 or 3 Metrics Network traffic, user behaviour 75% Free! Right person, right company, held. Integrations Mclaren Car Azure Cambridge & San Francisco Jill Popelka Intrusion Detection System 94% Fraudulent attempt to steal data usually via emails ZoomInfo, MX look up 2013 Protecting individual devices 92% Secure remote connections Malicious software demanding ransom Block unauthorized access 2400+
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber AI Analyst
Identity & Asset Management.
Microsoft
Sniping
The POD.
Covering the entire attack life cycle
Self-learning Artificial Intelligence (AI)
Identify, indicate, Implicate.
Natural History Museum
Coverage Areas
Pain point & next steps agreed.
Bring Your Own Device
Implicate Pain
Endpoint Detection & Response.
Identifies unusual behaviours in real time
Self learning AI
Jon Gainey
Autonomous Response
Security Information & Event management.
Economic Buyer
9000+
Virtual Private Network
6. Network, Email, Cloud, OT, identity & endpoint.
Extended detection & Response.
Network Detection & Response.
Chief Information Security Officer
Security Information and Event Management
Intrusion Prevention System.
2 or 3
Metrics
Network traffic, user behaviour
75%
Free!
Right person, right company, held.
Integrations
Mclaren Car
Azure
Cambridge & San Francisco
Jill Popelka
Intrusion Detection System
94%
Fraudulent attempt to steal data usually via emails
ZoomInfo, MX look up
2013
Protecting individual devices
92%
Secure remote connections
Malicious software demanding ransom
Block unauthorized access
2400+