ResilienceRiskassessmentAdaptabilityAlertfatigueInfluenceSecuritypostureBreakingbarriersSIEM(SecurityInformationand EventManagement)InsiderthreatThreathuntingForensicanalysisPhishingStrengthMalwareInspireDatabreachThreatintelligenceFirewallLeadingbyexampleBolddecisionsVulnerabilityscanningInclusionSOCanalystTrailblazerPrivilegedaccessVisionaryCollaborationGrowthmindsetLegacyMITREATT&CKConfidenceEmpowermentPurpose-drivenZero-dayattackRansomwareInnovationStrategicthinkingIncidentresponseEndpointdetectionMentorshipResilienceRiskassessmentAdaptabilityAlertfatigueInfluenceSecuritypostureBreakingbarriersSIEM(SecurityInformationand EventManagement)InsiderthreatThreathuntingForensicanalysisPhishingStrengthMalwareInspireDatabreachThreatintelligenceFirewallLeadingbyexampleBolddecisionsVulnerabilityscanningInclusionSOCanalystTrailblazerPrivilegedaccessVisionaryCollaborationGrowthmindsetLegacyMITREATT&CKConfidenceEmpowermentPurpose-drivenZero-dayattackRansomwareInnovationStrategicthinkingIncidentresponseEndpointdetectionMentorship

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Resilience
  2. Risk assessment
  3. Adaptability
  4. Alert fatigue
  5. Influence
  6. Security posture
  7. Breaking barriers
  8. SIEM (Security Information and Event Management)
  9. Insider threat
  10. Threat hunting
  11. Forensic analysis
  12. Phishing
  13. Strength
  14. Malware
  15. Inspire
  16. Data breach
  17. Threat intelligence
  18. Firewall
  19. Leading by example
  20. Bold decisions
  21. Vulnerability scanning
  22. Inclusion
  23. SOC analyst
  24. Trailblazer
  25. Privileged access
  26. Visionary
  27. Collaboration
  28. Growth mindset
  29. Legacy
  30. MITRE ATT&CK
  31. Confidence
  32. Empowerment
  33. Purpose-driven
  34. Zero-day attack
  35. Ransomware
  36. Innovation
  37. Strategic thinking
  38. Incident response
  39. Endpoint detection
  40. Mentorship