RiskManagementStrategySecurityContinousMonitorinThird-PartyManagementIdentityManagementVulnerabilitiesPasswordManagementSecurityAwareness& TrainingDetectionprocessesGovernanceHardwareInventoryDataflowsRiskToleranceBusinessEnvironmentPIIDataSecurityAnomaliesandEventsRiskAssessmentSoftwareInventorySOPSupply ChainManagementProtectiveTechnologyMaintenanceISACAssetManagementRiskManagementStrategySecurityContinousMonitorinThird-PartyManagementIdentityManagementVulnerabilitiesPasswordManagementSecurityAwareness& TrainingDetectionprocessesGovernanceHardwareInventoryDataflowsRiskToleranceBusinessEnvironmentPIIDataSecurityAnomaliesandEventsRiskAssessmentSoftwareInventorySOPSupply ChainManagementProtectiveTechnologyMaintenanceISACAssetManagement

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Risk Management Strategy
  2. Security Continous Monitorin
  3. Third-Party Management
  4. Identity Management
  5. Vulnerabilities
  6. Password Management
  7. Security Awareness & Training
  8. Detection processes
  9. Governance
  10. Hardware Inventory
  11. Data flows
  12. Risk Tolerance
  13. Business Environment
  14. PII
  15. Data Security
  16. Anomalies and Events
  17. Risk Assessment
  18. Software Inventory
  19. SOP
  20. Supply Chain Management
  21. Protective Technology
  22. Maintenance
  23. ISAC
  24. Asset Management