RiskassessmentBreakingbarriersStrengthPrivilegedaccessStrategicthinkingAlertfatigueSOCanalystBolddecisionsVisionaryInfluenceMITREATT&CKMentorshipVulnerabilityscanningMalwareThreathuntingZero-dayattackInnovationGrowthmindsetInspireLegacyIncidentresponseSIEM(SecurityInformationand EventManagement)FirewallInsiderthreatTrailblazerConfidenceForensicanalysisLeadingbyexamplePhishingAdaptabilityRansomwareCollaborationInclusionResilienceEmpowermentDatabreachEndpointdetectionSecuritypostureThreatintelligencePurpose-drivenRiskassessmentBreakingbarriersStrengthPrivilegedaccessStrategicthinkingAlertfatigueSOCanalystBolddecisionsVisionaryInfluenceMITREATT&CKMentorshipVulnerabilityscanningMalwareThreathuntingZero-dayattackInnovationGrowthmindsetInspireLegacyIncidentresponseSIEM(SecurityInformationand EventManagement)FirewallInsiderthreatTrailblazerConfidenceForensicanalysisLeadingbyexamplePhishingAdaptabilityRansomwareCollaborationInclusionResilienceEmpowermentDatabreachEndpointdetectionSecuritypostureThreatintelligencePurpose-driven

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Risk assessment
  2. Breaking barriers
  3. Strength
  4. Privileged access
  5. Strategic thinking
  6. Alert fatigue
  7. SOC analyst
  8. Bold decisions
  9. Visionary
  10. Influence
  11. MITRE ATT&CK
  12. Mentorship
  13. Vulnerability scanning
  14. Malware
  15. Threat hunting
  16. Zero-day attack
  17. Innovation
  18. Growth mindset
  19. Inspire
  20. Legacy
  21. Incident response
  22. SIEM (Security Information and Event Management)
  23. Firewall
  24. Insider threat
  25. Trailblazer
  26. Confidence
  27. Forensic analysis
  28. Leading by example
  29. Phishing
  30. Adaptability
  31. Ransomware
  32. Collaboration
  33. Inclusion
  34. Resilience
  35. Empowerment
  36. Data breach
  37. Endpoint detection
  38. Security posture
  39. Threat intelligence
  40. Purpose-driven