Secure Connected Places Portfolio Management Securing Critical and Emerging Tech Cyber Programmes Other Digital Identity - Assurance Digital Identity - Legislation and International Resilience - Regulations Cyber Sector - Growth and Innovation Digital Identity - Market Development Consumer Internet of Things Bill Analysis Strategy and International Resilience - Incentives Digital Identity - Governance Cyber Skills Secure Connected Places Portfolio Management Securing Critical and Emerging Tech Cyber Programmes Other Digital Identity - Assurance Digital Identity - Legislation and International Resilience - Regulations Cyber Sector - Growth and Innovation Digital Identity - Market Development Consumer Internet of Things Bill Analysis Strategy and International Resilience - Incentives Digital Identity - Governance Cyber Skills
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Secure Connected Places
Portfolio Management
Securing Critical and Emerging Tech
Cyber Programmes
Other
Digital Identity - Assurance
Digital Identity - Legislation and International
Resilience - Regulations
Cyber Sector - Growth and Innovation
Digital Identity - Market Development
Consumer Internet of Things Bill
Analysis
Strategy and International
Resilience - Incentives
Digital Identity - Governance
Cyber Skills