Change Collaboration Technical Support Data Privacy Malware California, USA 13 Core Employees Trustworthiness Cybersecurity Transnational Threats Taipei, Taiwan Innovation Eva Chen Tokyo, Japan Max Cheng Global Technical HQ Threat Experts Global CIA Vulnerabilities Steve Chang 2FA Information Services Customer 34 years Threat Research Ransomware Social Engineering Give and Match 24 years Homebuilding Program Rockwell Business Center Password ETDG April 1998 Jenny Chang Internet Safety for Kids and Families Change Collaboration Technical Support Data Privacy Malware California, USA 13 Core Employees Trustworthiness Cybersecurity Transnational Threats Taipei, Taiwan Innovation Eva Chen Tokyo, Japan Max Cheng Global Technical HQ Threat Experts Global CIA Vulnerabilities Steve Chang 2FA Information Services Customer 34 years Threat Research Ransomware Social Engineering Give and Match 24 years Homebuilding Program Rockwell Business Center Password ETDG April 1998 Jenny Chang Internet Safety for Kids and Families
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Change
Collaboration
Technical Support
Data Privacy
Malware
California, USA
13 Core Employees
Trustworthiness
Cybersecurity
Transnational
Threats
Taipei, Taiwan
Innovation
Eva Chen
Tokyo, Japan
Max Cheng
Global Technical HQ
Threat Experts
Global
CIA
Vulnerabilities
Steve Chang
2FA
Information Services
Customer
34 years
Threat Research
Ransomware
Social Engineering
Give and Match
24 years
Homebuilding Program
Rockwell Business Center
Password
ETDG
April 1998
Jenny Chang
Internet Safety for Kids and Families