Cyber Programmes Resilience - Incentives Secure Connected Places Consumer Internet of Things Bill Digital Identity - Assurance Portfolio Management Cyber Skills Digital Identity - Legislation and International Resilience - Regulations Other Digital Identity - Governance Strategy and International Digital Identity - Market Development Cyber Sector - Growth and Innovation Analysis Securing Critical and Emerging Tech Cyber Programmes Resilience - Incentives Secure Connected Places Consumer Internet of Things Bill Digital Identity - Assurance Portfolio Management Cyber Skills Digital Identity - Legislation and International Resilience - Regulations Other Digital Identity - Governance Strategy and International Digital Identity - Market Development Cyber Sector - Growth and Innovation Analysis Securing Critical and Emerging Tech
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber Programmes
Resilience - Incentives
Secure Connected Places
Consumer Internet of Things Bill
Digital Identity - Assurance
Portfolio Management
Cyber Skills
Digital Identity - Legislation and International
Resilience - Regulations
Other
Digital Identity - Governance
Strategy and International
Digital Identity - Market Development
Cyber Sector - Growth and Innovation
Analysis
Securing Critical and Emerging Tech