ResilienceInclusionVulnerabilityscanningThreathuntingInspireLegacyLeadingbyexampleMalwareIncidentresponseMentorshipPrivilegedaccessSIEM(SecurityInformationand EventManagement)GrowthmindsetSecuritypostureDatabreachTrailblazerCollaborationVisionaryAdaptabilityAlertfatigueZero-dayattackEndpointdetectionStrengthInnovationBolddecisionsRiskassessmentThreatintelligenceForensicanalysisRansomwarePhishingInsiderthreatConfidenceStrategicthinkingPurpose-drivenInfluenceFirewallSOCanalystMITREATT&CKBreakingbarriersEmpowermentResilienceInclusionVulnerabilityscanningThreathuntingInspireLegacyLeadingbyexampleMalwareIncidentresponseMentorshipPrivilegedaccessSIEM(SecurityInformationand EventManagement)GrowthmindsetSecuritypostureDatabreachTrailblazerCollaborationVisionaryAdaptabilityAlertfatigueZero-dayattackEndpointdetectionStrengthInnovationBolddecisionsRiskassessmentThreatintelligenceForensicanalysisRansomwarePhishingInsiderthreatConfidenceStrategicthinkingPurpose-drivenInfluenceFirewallSOCanalystMITREATT&CKBreakingbarriersEmpowerment

SOC Ladies - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Resilience
  2. Inclusion
  3. Vulnerability scanning
  4. Threat hunting
  5. Inspire
  6. Legacy
  7. Leading by example
  8. Malware
  9. Incident response
  10. Mentorship
  11. Privileged access
  12. SIEM (Security Information and Event Management)
  13. Growth mindset
  14. Security posture
  15. Data breach
  16. Trailblazer
  17. Collaboration
  18. Visionary
  19. Adaptability
  20. Alert fatigue
  21. Zero-day attack
  22. Endpoint detection
  23. Strength
  24. Innovation
  25. Bold decisions
  26. Risk assessment
  27. Threat intelligence
  28. Forensic analysis
  29. Ransomware
  30. Phishing
  31. Insider threat
  32. Confidence
  33. Strategic thinking
  34. Purpose-driven
  35. Influence
  36. Firewall
  37. SOC analyst
  38. MITRE ATT&CK
  39. Breaking barriers
  40. Empowerment