Third-PartyManagementSOPAnomaliesandEventsRiskManagementStrategyBusinessEnvironmentSecurityContinousMonitorinAssetManagementSupply ChainManagementRiskAssessmentDetectionprocessesPasswordManagementProtectiveTechnologyDataflowsISACPIIHardwareInventorySecurityAwareness& TrainingVulnerabilitiesGovernanceSoftwareInventoryRiskToleranceIdentityManagementDataSecurityMaintenanceThird-PartyManagementSOPAnomaliesandEventsRiskManagementStrategyBusinessEnvironmentSecurityContinousMonitorinAssetManagementSupply ChainManagementRiskAssessmentDetectionprocessesPasswordManagementProtectiveTechnologyDataflowsISACPIIHardwareInventorySecurityAwareness& TrainingVulnerabilitiesGovernanceSoftwareInventoryRiskToleranceIdentityManagementDataSecurityMaintenance

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Third-Party Management
  2. SOP
  3. Anomalies and Events
  4. Risk Management Strategy
  5. Business Environment
  6. Security Continous Monitorin
  7. Asset Management
  8. Supply Chain Management
  9. Risk Assessment
  10. Detection processes
  11. Password Management
  12. Protective Technology
  13. Data flows
  14. ISAC
  15. PII
  16. Hardware Inventory
  17. Security Awareness & Training
  18. Vulnerabilities
  19. Governance
  20. Software Inventory
  21. Risk Tolerance
  22. Identity Management
  23. Data Security
  24. Maintenance