Protectingindividualdevices6. Network,Email,Cloud, OT,identity &endpoint.Azure9000+ThePOD.MicrosoftCoverageAreas75%BlockunauthorizedaccessCyberAIAnalystIntrusionDetectionSystemMclarenCarPain point& nextstepsagreed.NaturalHistoryMuseumSelf-learningArtificialIntelligence(AI)94%ChiefInformationSecurityOfficerNetworktraffic,userbehaviourCambridge& SanFranciscoEconomicBuyerZoomInfo,MX lookupSecurityInformationand EventManagementFraudulentattempt tosteal datausually viaemailsImplicatePainIdentifiesunusualbehavioursin real timeEndpointDetection&Response.Free!Rightperson, rightcompany,held.Identify,indicate,Implicate.Extendeddetection&Response.IntrusionPreventionSystem.MalicioussoftwaredemandingransomVirtualPrivateNetworkIntegrationsSecureremoteconnectionsSecurityInformation &Eventmanagement.JonGaineySelflearningAIIdentity &AssetManagement.2013Coveringthe entireattack lifecycleJillPopelkaNetworkDetection&Response.Sniping2400+92%BringYour OwnDeviceMetrics2 or3AutonomousResponseProtectingindividualdevices6. Network,Email,Cloud, OT,identity &endpoint.Azure9000+ThePOD.MicrosoftCoverageAreas75%BlockunauthorizedaccessCyberAIAnalystIntrusionDetectionSystemMclarenCarPain point& nextstepsagreed.NaturalHistoryMuseumSelf-learningArtificialIntelligence(AI)94%ChiefInformationSecurityOfficerNetworktraffic,userbehaviourCambridge& SanFranciscoEconomicBuyerZoomInfo,MX lookupSecurityInformationand EventManagementFraudulentattempt tosteal datausually viaemailsImplicatePainIdentifiesunusualbehavioursin real timeEndpointDetection&Response.Free!Rightperson, rightcompany,held.Identify,indicate,Implicate.Extendeddetection&Response.IntrusionPreventionSystem.MalicioussoftwaredemandingransomVirtualPrivateNetworkIntegrationsSecureremoteconnectionsSecurityInformation &Eventmanagement.JonGaineySelflearningAIIdentity &AssetManagement.2013Coveringthe entireattack lifecycleJillPopelkaNetworkDetection&Response.Sniping2400+92%BringYour OwnDeviceMetrics2 or3AutonomousResponse

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Protecting individual devices
  2. 6. Network, Email, Cloud, OT, identity & endpoint.
  3. Azure
  4. 9000+
  5. The POD.
  6. Microsoft
  7. Coverage Areas
  8. 75%
  9. Block unauthorized access
  10. Cyber AI Analyst
  11. Intrusion Detection System
  12. Mclaren Car
  13. Pain point & next steps agreed.
  14. Natural History Museum
  15. Self-learning Artificial Intelligence (AI)
  16. 94%
  17. Chief Information Security Officer
  18. Network traffic, user behaviour
  19. Cambridge & San Francisco
  20. Economic Buyer
  21. ZoomInfo, MX look up
  22. Security Information and Event Management
  23. Fraudulent attempt to steal data usually via emails
  24. Implicate Pain
  25. Identifies unusual behaviours in real time
  26. Endpoint Detection & Response.
  27. Free!
  28. Right person, right company, held.
  29. Identify, indicate, Implicate.
  30. Extended detection & Response.
  31. Intrusion Prevention System.
  32. Malicious software demanding ransom
  33. Virtual Private Network
  34. Integrations
  35. Secure remote connections
  36. Security Information & Event management.
  37. Jon Gainey
  38. Self learning AI
  39. Identity & Asset Management.
  40. 2013
  41. Covering the entire attack life cycle
  42. Jill Popelka
  43. Network Detection & Response.
  44. Sniping
  45. 2400+
  46. 92%
  47. Bring Your Own Device
  48. Metrics
  49. 2 or 3
  50. Autonomous Response