PIIRiskAssessmentVulnerabilitiesGovernanceProtectiveTechnologyIdentityManagementSecurityAwareness& TrainingBusinessEnvironmentSecurityContinousMonitorinHardwareInventoryAnomaliesandEventsDetectionprocessesISACAssetManagementDataflowsSOPSoftwareInventoryThird-PartyManagementRiskTolerancePasswordManagementRiskManagementStrategyMaintenanceSupply ChainManagementDataSecurityPIIRiskAssessmentVulnerabilitiesGovernanceProtectiveTechnologyIdentityManagementSecurityAwareness& TrainingBusinessEnvironmentSecurityContinousMonitorinHardwareInventoryAnomaliesandEventsDetectionprocessesISACAssetManagementDataflowsSOPSoftwareInventoryThird-PartyManagementRiskTolerancePasswordManagementRiskManagementStrategyMaintenanceSupply ChainManagementDataSecurity

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. PII
  2. Risk Assessment
  3. Vulnerabilities
  4. Governance
  5. Protective Technology
  6. Identity Management
  7. Security Awareness & Training
  8. Business Environment
  9. Security Continous Monitorin
  10. Hardware Inventory
  11. Anomalies and Events
  12. Detection processes
  13. ISAC
  14. Asset Management
  15. Data flows
  16. SOP
  17. Software Inventory
  18. Third-Party Management
  19. Risk Tolerance
  20. Password Management
  21. Risk Management Strategy
  22. Maintenance
  23. Supply Chain Management
  24. Data Security