VisionaryInspireBreakingbarriersZero-dayattackTrailblazerStrategicthinkingVulnerabilityscanningMentorshipThreathuntingPrivilegedaccessConfidenceSIEM(SecurityInformationand EventManagement)SOCanalystEmpowermentFirewallInfluenceIncidentresponsePurpose-drivenGrowthmindsetAlertfatiguePhishingEndpointdetectionResilienceDatabreachLeadingbyexampleForensicanalysisCollaborationMITREATT&CKLegacyInnovationInsiderthreatInclusionSecuritypostureStrengthThreatintelligenceRansomwareBolddecisionsRiskassessmentAdaptabilityMalwareVisionaryInspireBreakingbarriersZero-dayattackTrailblazerStrategicthinkingVulnerabilityscanningMentorshipThreathuntingPrivilegedaccessConfidenceSIEM(SecurityInformationand EventManagement)SOCanalystEmpowermentFirewallInfluenceIncidentresponsePurpose-drivenGrowthmindsetAlertfatiguePhishingEndpointdetectionResilienceDatabreachLeadingbyexampleForensicanalysisCollaborationMITREATT&CKLegacyInnovationInsiderthreatInclusionSecuritypostureStrengthThreatintelligenceRansomwareBolddecisionsRiskassessmentAdaptabilityMalware

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Visionary
  2. Inspire
  3. Breaking barriers
  4. Zero-day attack
  5. Trailblazer
  6. Strategic thinking
  7. Vulnerability scanning
  8. Mentorship
  9. Threat hunting
  10. Privileged access
  11. Confidence
  12. SIEM (Security Information and Event Management)
  13. SOC analyst
  14. Empowerment
  15. Firewall
  16. Influence
  17. Incident response
  18. Purpose-driven
  19. Growth mindset
  20. Alert fatigue
  21. Phishing
  22. Endpoint detection
  23. Resilience
  24. Data breach
  25. Leading by example
  26. Forensic analysis
  27. Collaboration
  28. MITRE ATT&CK
  29. Legacy
  30. Innovation
  31. Insider threat
  32. Inclusion
  33. Security posture
  34. Strength
  35. Threat intelligence
  36. Ransomware
  37. Bold decisions
  38. Risk assessment
  39. Adaptability
  40. Malware