Purpose-drivenConfidenceStrengthPhishingMalwareResilienceMITREATT&CKEndpointdetectionForensicanalysisBolddecisionsThreatintelligenceStrategicthinkingEmpowermentInnovationInfluenceSOCanalystInclusionVulnerabilityscanningInspireGrowthmindsetIncidentresponseInsiderthreatAlertfatigueCollaborationLegacySIEM(SecurityInformationand EventManagement)FirewallThreathuntingTrailblazerAdaptabilityRiskassessmentRansomwareVisionarySecuritypostureBreakingbarriersPrivilegedaccessZero-dayattackMentorshipLeadingbyexampleDatabreachPurpose-drivenConfidenceStrengthPhishingMalwareResilienceMITREATT&CKEndpointdetectionForensicanalysisBolddecisionsThreatintelligenceStrategicthinkingEmpowermentInnovationInfluenceSOCanalystInclusionVulnerabilityscanningInspireGrowthmindsetIncidentresponseInsiderthreatAlertfatigueCollaborationLegacySIEM(SecurityInformationand EventManagement)FirewallThreathuntingTrailblazerAdaptabilityRiskassessmentRansomwareVisionarySecuritypostureBreakingbarriersPrivilegedaccessZero-dayattackMentorshipLeadingbyexampleDatabreach

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Purpose-driven
  2. Confidence
  3. Strength
  4. Phishing
  5. Malware
  6. Resilience
  7. MITRE ATT&CK
  8. Endpoint detection
  9. Forensic analysis
  10. Bold decisions
  11. Threat intelligence
  12. Strategic thinking
  13. Empowerment
  14. Innovation
  15. Influence
  16. SOC analyst
  17. Inclusion
  18. Vulnerability scanning
  19. Inspire
  20. Growth mindset
  21. Incident response
  22. Insider threat
  23. Alert fatigue
  24. Collaboration
  25. Legacy
  26. SIEM (Security Information and Event Management)
  27. Firewall
  28. Threat hunting
  29. Trailblazer
  30. Adaptability
  31. Risk assessment
  32. Ransomware
  33. Visionary
  34. Security posture
  35. Breaking barriers
  36. Privileged access
  37. Zero-day attack
  38. Mentorship
  39. Leading by example
  40. Data breach