DatabreachRansomwareEndpointdetectionCollaborationInspireAlertfatigueRiskassessmentBolddecisionsBreakingbarriersTrailblazerMalwareStrategicthinkingResilienceLeadingbyexampleStrengthIncidentresponseThreathuntingVisionaryInclusionMITREATT&CKMentorshipSecurityposturePrivilegedaccessThreatintelligenceInnovationForensicanalysisInfluenceSOCanalystPurpose-drivenEmpowermentVulnerabilityscanningGrowthmindsetZero-dayattackConfidenceAdaptabilityPhishingFirewallLegacyInsiderthreatSIEM(SecurityInformationand EventManagement)DatabreachRansomwareEndpointdetectionCollaborationInspireAlertfatigueRiskassessmentBolddecisionsBreakingbarriersTrailblazerMalwareStrategicthinkingResilienceLeadingbyexampleStrengthIncidentresponseThreathuntingVisionaryInclusionMITREATT&CKMentorshipSecurityposturePrivilegedaccessThreatintelligenceInnovationForensicanalysisInfluenceSOCanalystPurpose-drivenEmpowermentVulnerabilityscanningGrowthmindsetZero-dayattackConfidenceAdaptabilityPhishingFirewallLegacyInsiderthreatSIEM(SecurityInformationand EventManagement)

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Data breach
  2. Ransomware
  3. Endpoint detection
  4. Collaboration
  5. Inspire
  6. Alert fatigue
  7. Risk assessment
  8. Bold decisions
  9. Breaking barriers
  10. Trailblazer
  11. Malware
  12. Strategic thinking
  13. Resilience
  14. Leading by example
  15. Strength
  16. Incident response
  17. Threat hunting
  18. Visionary
  19. Inclusion
  20. MITRE ATT&CK
  21. Mentorship
  22. Security posture
  23. Privileged access
  24. Threat intelligence
  25. Innovation
  26. Forensic analysis
  27. Influence
  28. SOC analyst
  29. Purpose-driven
  30. Empowerment
  31. Vulnerability scanning
  32. Growth mindset
  33. Zero-day attack
  34. Confidence
  35. Adaptability
  36. Phishing
  37. Firewall
  38. Legacy
  39. Insider threat
  40. SIEM (Security Information and Event Management)