Secure Connected Places Consumer Internet of Things Bill Digital Identity - Governance Digital Identity - Market Development Analysis Strategy and International Resilience - Incentives Digital Identity - Assurance Cyber Sector - Growth and Innovation Resilience - Regulations Cyber Skills Other Digital Identity - Legislation and International Cyber Programmes Portfolio Management Securing Critical and Emerging Tech Secure Connected Places Consumer Internet of Things Bill Digital Identity - Governance Digital Identity - Market Development Analysis Strategy and International Resilience - Incentives Digital Identity - Assurance Cyber Sector - Growth and Innovation Resilience - Regulations Cyber Skills Other Digital Identity - Legislation and International Cyber Programmes Portfolio Management Securing Critical and Emerging Tech
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Secure Connected Places
Consumer Internet of Things Bill
Digital Identity - Governance
Digital Identity - Market Development
Analysis
Strategy and International
Resilience - Incentives
Digital Identity - Assurance
Cyber Sector - Growth and Innovation
Resilience - Regulations
Cyber Skills
Other
Digital Identity - Legislation and International
Cyber Programmes
Portfolio Management
Securing Critical and Emerging Tech