PasswordManagementAnomaliesandEventsSoftwareInventoryProtectiveTechnologyBusinessEnvironmentSupply ChainManagementRiskManagementStrategyRiskToleranceISACSOPVulnerabilitiesDataSecurityThird-PartyManagementMaintenanceGovernanceDataflowsSecurityContinousMonitorinIdentityManagementPIIRiskAssessmentAssetManagementHardwareInventoryDetectionprocessesSecurityAwareness& TrainingPasswordManagementAnomaliesandEventsSoftwareInventoryProtectiveTechnologyBusinessEnvironmentSupply ChainManagementRiskManagementStrategyRiskToleranceISACSOPVulnerabilitiesDataSecurityThird-PartyManagementMaintenanceGovernanceDataflowsSecurityContinousMonitorinIdentityManagementPIIRiskAssessmentAssetManagementHardwareInventoryDetectionprocessesSecurityAwareness& Training

Cybersecurity Twingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Password Management
  2. Anomalies and Events
  3. Software Inventory
  4. Protective Technology
  5. Business Environment
  6. Supply Chain Management
  7. Risk Management Strategy
  8. Risk Tolerance
  9. ISAC
  10. SOP
  11. Vulnerabilities
  12. Data Security
  13. Third-Party Management
  14. Maintenance
  15. Governance
  16. Data flows
  17. Security Continous Monitorin
  18. Identity Management
  19. PII
  20. Risk Assessment
  21. Asset Management
  22. Hardware Inventory
  23. Detection processes
  24. Security Awareness & Training