MITREATT&CKInnovationAlertfatigueLeadingbyexampleIncidentresponseTrailblazerForensicanalysisStrategicthinkingMalwareInfluenceZero-dayattackSecuritypostureInsiderthreatSOCanalystStrengthThreatintelligenceFirewallPhishingSIEM(SecurityInformationand EventManagement)BolddecisionsGrowthmindsetInclusionInspireBreakingbarriersDatabreachEndpointdetectionAdaptabilityEmpowermentRansomwareThreathuntingRiskassessmentResilienceConfidenceCollaborationLegacyVisionaryPurpose-drivenVulnerabilityscanningPrivilegedaccessMentorshipMITREATT&CKInnovationAlertfatigueLeadingbyexampleIncidentresponseTrailblazerForensicanalysisStrategicthinkingMalwareInfluenceZero-dayattackSecuritypostureInsiderthreatSOCanalystStrengthThreatintelligenceFirewallPhishingSIEM(SecurityInformationand EventManagement)BolddecisionsGrowthmindsetInclusionInspireBreakingbarriersDatabreachEndpointdetectionAdaptabilityEmpowermentRansomwareThreathuntingRiskassessmentResilienceConfidenceCollaborationLegacyVisionaryPurpose-drivenVulnerabilityscanningPrivilegedaccessMentorship

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. MITRE ATT&CK
  2. Innovation
  3. Alert fatigue
  4. Leading by example
  5. Incident response
  6. Trailblazer
  7. Forensic analysis
  8. Strategic thinking
  9. Malware
  10. Influence
  11. Zero-day attack
  12. Security posture
  13. Insider threat
  14. SOC analyst
  15. Strength
  16. Threat intelligence
  17. Firewall
  18. Phishing
  19. SIEM (Security Information and Event Management)
  20. Bold decisions
  21. Growth mindset
  22. Inclusion
  23. Inspire
  24. Breaking barriers
  25. Data breach
  26. Endpoint detection
  27. Adaptability
  28. Empowerment
  29. Ransomware
  30. Threat hunting
  31. Risk assessment
  32. Resilience
  33. Confidence
  34. Collaboration
  35. Legacy
  36. Visionary
  37. Purpose-driven
  38. Vulnerability scanning
  39. Privileged access
  40. Mentorship