PasswordManagementDataSecurityDetectionprocessesSupply ChainManagementSOPRiskAssessmentHardwareInventoryDataflowsThird-PartyManagementSoftwareInventoryGovernanceISACMaintenanceRiskManagementStrategyVulnerabilitiesAssetManagementProtectiveTechnologyPIIAnomaliesandEventsSecurityContinousMonitorinBusinessEnvironmentRiskToleranceIdentityManagementSecurityAwareness& TrainingPasswordManagementDataSecurityDetectionprocessesSupply ChainManagementSOPRiskAssessmentHardwareInventoryDataflowsThird-PartyManagementSoftwareInventoryGovernanceISACMaintenanceRiskManagementStrategyVulnerabilitiesAssetManagementProtectiveTechnologyPIIAnomaliesandEventsSecurityContinousMonitorinBusinessEnvironmentRiskToleranceIdentityManagementSecurityAwareness& Training

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Password Management
  2. Data Security
  3. Detection processes
  4. Supply Chain Management
  5. SOP
  6. Risk Assessment
  7. Hardware Inventory
  8. Data flows
  9. Third-Party Management
  10. Software Inventory
  11. Governance
  12. ISAC
  13. Maintenance
  14. Risk Management Strategy
  15. Vulnerabilities
  16. Asset Management
  17. Protective Technology
  18. PII
  19. Anomalies and Events
  20. Security Continous Monitorin
  21. Business Environment
  22. Risk Tolerance
  23. Identity Management
  24. Security Awareness & Training