AssetManagementPasswordManagementSupply ChainManagementHardwareInventoryProtectiveTechnologyVulnerabilitiesRiskManagementStrategyDataSecuritySecurityAwareness& TrainingDataflowsBusinessEnvironmentSoftwareInventoryMaintenanceISACThird-PartyManagementRiskToleranceSecurityContinousMonitorinRiskAssessmentIdentityManagementAnomaliesandEventsGovernancePIISOPDetectionprocessesAssetManagementPasswordManagementSupply ChainManagementHardwareInventoryProtectiveTechnologyVulnerabilitiesRiskManagementStrategyDataSecuritySecurityAwareness& TrainingDataflowsBusinessEnvironmentSoftwareInventoryMaintenanceISACThird-PartyManagementRiskToleranceSecurityContinousMonitorinRiskAssessmentIdentityManagementAnomaliesandEventsGovernancePIISOPDetectionprocesses

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Asset Management
  2. Password Management
  3. Supply Chain Management
  4. Hardware Inventory
  5. Protective Technology
  6. Vulnerabilities
  7. Risk Management Strategy
  8. Data Security
  9. Security Awareness & Training
  10. Data flows
  11. Business Environment
  12. Software Inventory
  13. Maintenance
  14. ISAC
  15. Third-Party Management
  16. Risk Tolerance
  17. Security Continous Monitorin
  18. Risk Assessment
  19. Identity Management
  20. Anomalies and Events
  21. Governance
  22. PII
  23. SOP
  24. Detection processes