The POD. Protecting individual devices Intrusion Prevention System. Implicate Pain Azure 2013 6. Network, Email, Cloud, OT, identity & endpoint. ZoomInfo, MX look up Self-learning Artificial Intelligence (AI) Network Detection & Response. Self learning AI 92% Natural History Museum Covering the entire attack life cycle Chief Information Security Officer Security Information and Event Management 94% Coverage Areas Jill Popelka 2400+ Identify, indicate, Implicate. Block unauthorized access Network traffic, user behaviour Identifies unusual behaviours in real time Bring Your Own Device Integrations Endpoint Detection & Response. Cyber AI Analyst Microsoft Autonomous Response Security Information & Event management. Mclaren Car Intrusion Detection System 2 or 3 75% Secure remote connections Fraudulent attempt to steal data usually via emails Malicious software demanding ransom Identity & Asset Management. Virtual Private Network Sniping Jon Gainey Free! Right person, right company, held. Metrics Cambridge & San Francisco Extended detection & Response. Economic Buyer Pain point & next steps agreed. 9000+ The POD. Protecting individual devices Intrusion Prevention System. Implicate Pain Azure 2013 6. Network, Email, Cloud, OT, identity & endpoint. ZoomInfo, MX look up Self-learning Artificial Intelligence (AI) Network Detection & Response. Self learning AI 92% Natural History Museum Covering the entire attack life cycle Chief Information Security Officer Security Information and Event Management 94% Coverage Areas Jill Popelka 2400+ Identify, indicate, Implicate. Block unauthorized access Network traffic, user behaviour Identifies unusual behaviours in real time Bring Your Own Device Integrations Endpoint Detection & Response. Cyber AI Analyst Microsoft Autonomous Response Security Information & Event management. Mclaren Car Intrusion Detection System 2 or 3 75% Secure remote connections Fraudulent attempt to steal data usually via emails Malicious software demanding ransom Identity & Asset Management. Virtual Private Network Sniping Jon Gainey Free! Right person, right company, held. Metrics Cambridge & San Francisco Extended detection & Response. Economic Buyer Pain point & next steps agreed. 9000+
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
The POD.
Protecting individual devices
Intrusion Prevention System.
Implicate Pain
Azure
2013
6. Network, Email, Cloud, OT, identity & endpoint.
ZoomInfo, MX look up
Self-learning Artificial Intelligence (AI)
Network Detection & Response.
Self learning AI
92%
Natural History Museum
Covering the entire attack life cycle
Chief Information Security Officer
Security Information and Event Management
94%
Coverage Areas
Jill Popelka
2400+
Identify, indicate, Implicate.
Block unauthorized access
Network traffic, user behaviour
Identifies unusual behaviours in real time
Bring Your Own Device
Integrations
Endpoint Detection & Response.
Cyber AI Analyst
Microsoft
Autonomous Response
Security Information & Event management.
Mclaren Car
Intrusion Detection System
2 or 3
75%
Secure remote connections
Fraudulent attempt to steal data usually via emails
Malicious software demanding ransom
Identity & Asset Management.
Virtual Private Network
Sniping
Jon Gainey
Free!
Right person, right company, held.
Metrics
Cambridge & San Francisco
Extended detection & Response.
Economic Buyer
Pain point & next steps agreed.
9000+