ThePOD.ProtectingindividualdevicesIntrusionPreventionSystem.ImplicatePainAzure20136. Network,Email,Cloud, OT,identity &endpoint.ZoomInfo,MX lookupSelf-learningArtificialIntelligence(AI)NetworkDetection&Response.SelflearningAI92%NaturalHistoryMuseumCoveringthe entireattack lifecycleChiefInformationSecurityOfficerSecurityInformationand EventManagement94%CoverageAreasJillPopelka2400+Identify,indicate,Implicate.BlockunauthorizedaccessNetworktraffic,userbehaviourIdentifiesunusualbehavioursin real timeBringYour OwnDeviceIntegrationsEndpointDetection&Response.CyberAIAnalystMicrosoftAutonomousResponseSecurityInformation &Eventmanagement.MclarenCarIntrusionDetectionSystem2 or375%SecureremoteconnectionsFraudulentattempt tosteal datausually viaemailsMalicioussoftwaredemandingransomIdentity &AssetManagement.VirtualPrivateNetworkSnipingJonGaineyFree!Rightperson, rightcompany,held.MetricsCambridge& SanFranciscoExtendeddetection&Response.EconomicBuyerPain point& nextstepsagreed.9000+ThePOD.ProtectingindividualdevicesIntrusionPreventionSystem.ImplicatePainAzure20136. Network,Email,Cloud, OT,identity &endpoint.ZoomInfo,MX lookupSelf-learningArtificialIntelligence(AI)NetworkDetection&Response.SelflearningAI92%NaturalHistoryMuseumCoveringthe entireattack lifecycleChiefInformationSecurityOfficerSecurityInformationand EventManagement94%CoverageAreasJillPopelka2400+Identify,indicate,Implicate.BlockunauthorizedaccessNetworktraffic,userbehaviourIdentifiesunusualbehavioursin real timeBringYour OwnDeviceIntegrationsEndpointDetection&Response.CyberAIAnalystMicrosoftAutonomousResponseSecurityInformation &Eventmanagement.MclarenCarIntrusionDetectionSystem2 or375%SecureremoteconnectionsFraudulentattempt tosteal datausually viaemailsMalicioussoftwaredemandingransomIdentity &AssetManagement.VirtualPrivateNetworkSnipingJonGaineyFree!Rightperson, rightcompany,held.MetricsCambridge& SanFranciscoExtendeddetection&Response.EconomicBuyerPain point& nextstepsagreed.9000+

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. The POD.
  2. Protecting individual devices
  3. Intrusion Prevention System.
  4. Implicate Pain
  5. Azure
  6. 2013
  7. 6. Network, Email, Cloud, OT, identity & endpoint.
  8. ZoomInfo, MX look up
  9. Self-learning Artificial Intelligence (AI)
  10. Network Detection & Response.
  11. Self learning AI
  12. 92%
  13. Natural History Museum
  14. Covering the entire attack life cycle
  15. Chief Information Security Officer
  16. Security Information and Event Management
  17. 94%
  18. Coverage Areas
  19. Jill Popelka
  20. 2400+
  21. Identify, indicate, Implicate.
  22. Block unauthorized access
  23. Network traffic, user behaviour
  24. Identifies unusual behaviours in real time
  25. Bring Your Own Device
  26. Integrations
  27. Endpoint Detection & Response.
  28. Cyber AI Analyst
  29. Microsoft
  30. Autonomous Response
  31. Security Information & Event management.
  32. Mclaren Car
  33. Intrusion Detection System
  34. 2 or 3
  35. 75%
  36. Secure remote connections
  37. Fraudulent attempt to steal data usually via emails
  38. Malicious software demanding ransom
  39. Identity & Asset Management.
  40. Virtual Private Network
  41. Sniping
  42. Jon Gainey
  43. Free!
  44. Right person, right company, held.
  45. Metrics
  46. Cambridge & San Francisco
  47. Extended detection & Response.
  48. Economic Buyer
  49. Pain point & next steps agreed.
  50. 9000+