SecurityContinousMonitorinDataSecurityHardwareInventoryAssetManagementSecurityAwareness& TrainingSoftwareInventoryRiskToleranceDetectionprocessesMaintenanceRiskAssessmentPasswordManagementGovernancePIIDataflowsVulnerabilitiesSupply ChainManagementISACIdentityManagementProtectiveTechnologyBusinessEnvironmentRiskManagementStrategyThird-PartyManagementSOPAnomaliesandEventsSecurityContinousMonitorinDataSecurityHardwareInventoryAssetManagementSecurityAwareness& TrainingSoftwareInventoryRiskToleranceDetectionprocessesMaintenanceRiskAssessmentPasswordManagementGovernancePIIDataflowsVulnerabilitiesSupply ChainManagementISACIdentityManagementProtectiveTechnologyBusinessEnvironmentRiskManagementStrategyThird-PartyManagementSOPAnomaliesandEvents

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Security Continous Monitorin
  2. Data Security
  3. Hardware Inventory
  4. Asset Management
  5. Security Awareness & Training
  6. Software Inventory
  7. Risk Tolerance
  8. Detection processes
  9. Maintenance
  10. Risk Assessment
  11. Password Management
  12. Governance
  13. PII
  14. Data flows
  15. Vulnerabilities
  16. Supply Chain Management
  17. ISAC
  18. Identity Management
  19. Protective Technology
  20. Business Environment
  21. Risk Management Strategy
  22. Third-Party Management
  23. SOP
  24. Anomalies and Events