SecurityContinousMonitorinSupply ChainManagementRiskToleranceSOPIdentityManagementThird-PartyManagementPasswordManagementISACSoftwareInventorySecurityAwareness& TrainingMaintenanceDataSecurityBusinessEnvironmentGovernanceDataflowsPIIAssetManagementRiskManagementStrategyHardwareInventoryRiskAssessmentVulnerabilitiesDetectionprocessesAnomaliesandEventsProtectiveTechnologySecurityContinousMonitorinSupply ChainManagementRiskToleranceSOPIdentityManagementThird-PartyManagementPasswordManagementISACSoftwareInventorySecurityAwareness& TrainingMaintenanceDataSecurityBusinessEnvironmentGovernanceDataflowsPIIAssetManagementRiskManagementStrategyHardwareInventoryRiskAssessmentVulnerabilitiesDetectionprocessesAnomaliesandEventsProtectiveTechnology

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Security Continous Monitorin
  2. Supply Chain Management
  3. Risk Tolerance
  4. SOP
  5. Identity Management
  6. Third-Party Management
  7. Password Management
  8. ISAC
  9. Software Inventory
  10. Security Awareness & Training
  11. Maintenance
  12. Data Security
  13. Business Environment
  14. Governance
  15. Data flows
  16. PII
  17. Asset Management
  18. Risk Management Strategy
  19. Hardware Inventory
  20. Risk Assessment
  21. Vulnerabilities
  22. Detection processes
  23. Anomalies and Events
  24. Protective Technology