IdentityManagementBusinessEnvironmentAssetManagementAnomaliesandEventsRiskToleranceRiskAssessmentDataflowsSoftwareInventoryProtectiveTechnologyVulnerabilitiesPIIGovernancePasswordManagementMaintenanceRiskManagementStrategyISACSOPHardwareInventorySecurityAwareness& TrainingDataSecuritySupply ChainManagementThird-PartyManagementDetectionprocessesSecurityContinousMonitorinIdentityManagementBusinessEnvironmentAssetManagementAnomaliesandEventsRiskToleranceRiskAssessmentDataflowsSoftwareInventoryProtectiveTechnologyVulnerabilitiesPIIGovernancePasswordManagementMaintenanceRiskManagementStrategyISACSOPHardwareInventorySecurityAwareness& TrainingDataSecuritySupply ChainManagementThird-PartyManagementDetectionprocessesSecurityContinousMonitorin

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Identity Management
  2. Business Environment
  3. Asset Management
  4. Anomalies and Events
  5. Risk Tolerance
  6. Risk Assessment
  7. Data flows
  8. Software Inventory
  9. Protective Technology
  10. Vulnerabilities
  11. PII
  12. Governance
  13. Password Management
  14. Maintenance
  15. Risk Management Strategy
  16. ISAC
  17. SOP
  18. Hardware Inventory
  19. Security Awareness & Training
  20. Data Security
  21. Supply Chain Management
  22. Third-Party Management
  23. Detection processes
  24. Security Continous Monitorin