StrategicthinkingInnovationBolddecisionsThreatintelligenceStrengthInsiderthreatTrailblazerVulnerabilityscanningSOCanalystZero-dayattackBreakingbarriersMITREATT&CKInclusionMalwareIncidentresponseConfidenceCollaborationGrowthmindsetLeadingbyexampleEmpowermentForensicanalysisAlertfatigueEndpointdetectionPurpose-drivenRiskassessmentFirewallMentorshipPrivilegedaccessDatabreachLegacySecuritypostureAdaptabilitySIEM(SecurityInformationand EventManagement)VisionaryResilienceInfluenceRansomwarePhishingThreathuntingInspireStrategicthinkingInnovationBolddecisionsThreatintelligenceStrengthInsiderthreatTrailblazerVulnerabilityscanningSOCanalystZero-dayattackBreakingbarriersMITREATT&CKInclusionMalwareIncidentresponseConfidenceCollaborationGrowthmindsetLeadingbyexampleEmpowermentForensicanalysisAlertfatigueEndpointdetectionPurpose-drivenRiskassessmentFirewallMentorshipPrivilegedaccessDatabreachLegacySecuritypostureAdaptabilitySIEM(SecurityInformationand EventManagement)VisionaryResilienceInfluenceRansomwarePhishingThreathuntingInspire

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Strategic thinking
  2. Innovation
  3. Bold decisions
  4. Threat intelligence
  5. Strength
  6. Insider threat
  7. Trailblazer
  8. Vulnerability scanning
  9. SOC analyst
  10. Zero-day attack
  11. Breaking barriers
  12. MITRE ATT&CK
  13. Inclusion
  14. Malware
  15. Incident response
  16. Confidence
  17. Collaboration
  18. Growth mindset
  19. Leading by example
  20. Empowerment
  21. Forensic analysis
  22. Alert fatigue
  23. Endpoint detection
  24. Purpose-driven
  25. Risk assessment
  26. Firewall
  27. Mentorship
  28. Privileged access
  29. Data breach
  30. Legacy
  31. Security posture
  32. Adaptability
  33. SIEM (Security Information and Event Management)
  34. Visionary
  35. Resilience
  36. Influence
  37. Ransomware
  38. Phishing
  39. Threat hunting
  40. Inspire