Malware Information Services Innovation CIA Taipei, Taiwan Global Social Engineering Internet Safety for Kids and Families Threat Research Tokyo, Japan Jenny Chang Threat Experts Eva Chen Steve Chang California, USA Give and Match Ransomware Threats Technical Support Max Cheng Homebuilding Program Transnational Rockwell Business Center Vulnerabilities Customer Collaboration Data Privacy ETDG April 1998 Global Technical HQ 2FA Trustworthiness 34 years Password Cybersecurity 24 years Change 13 Core Employees Malware Information Services Innovation CIA Taipei, Taiwan Global Social Engineering Internet Safety for Kids and Families Threat Research Tokyo, Japan Jenny Chang Threat Experts Eva Chen Steve Chang California, USA Give and Match Ransomware Threats Technical Support Max Cheng Homebuilding Program Transnational Rockwell Business Center Vulnerabilities Customer Collaboration Data Privacy ETDG April 1998 Global Technical HQ 2FA Trustworthiness 34 years Password Cybersecurity 24 years Change 13 Core Employees
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malware
Information Services
Innovation
CIA
Taipei, Taiwan
Global
Social Engineering
Internet Safety for Kids and Families
Threat Research
Tokyo, Japan
Jenny Chang
Threat Experts
Eva Chen
Steve Chang
California, USA
Give and Match
Ransomware
Threats
Technical Support
Max Cheng
Homebuilding Program
Transnational
Rockwell Business Center
Vulnerabilities
Customer
Collaboration
Data Privacy
ETDG
April 1998
Global Technical HQ
2FA
Trustworthiness
34 years
Password
Cybersecurity
24 years
Change
13 Core Employees