Collaboration Information Services Give and Match 13 Core Employees Steve Chang Malware Cybersecurity Customer Threat Experts Social Engineering Global CIA Change Threats Innovation Rockwell Business Center Global Technical HQ 24 years Homebuilding Program California, USA Ransomware Jenny Chang Trustworthiness Tokyo, Japan Max Cheng 2FA ETDG Eva Chen April 1998 Password Vulnerabilities 34 years Data Privacy Technical Support Taipei, Taiwan Internet Safety for Kids and Families Threat Research Transnational Collaboration Information Services Give and Match 13 Core Employees Steve Chang Malware Cybersecurity Customer Threat Experts Social Engineering Global CIA Change Threats Innovation Rockwell Business Center Global Technical HQ 24 years Homebuilding Program California, USA Ransomware Jenny Chang Trustworthiness Tokyo, Japan Max Cheng 2FA ETDG Eva Chen April 1998 Password Vulnerabilities 34 years Data Privacy Technical Support Taipei, Taiwan Internet Safety for Kids and Families Threat Research Transnational
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Collaboration
Information Services
Give and Match
13 Core Employees
Steve Chang
Malware
Cybersecurity
Customer
Threat Experts
Social Engineering
Global
CIA
Change
Threats
Innovation
Rockwell Business Center
Global Technical HQ
24 years
Homebuilding Program
California, USA
Ransomware
Jenny Chang
Trustworthiness
Tokyo, Japan
Max Cheng
2FA
ETDG
Eva Chen
April 1998
Password
Vulnerabilities
34 years
Data Privacy
Technical Support
Taipei, Taiwan
Internet Safety for Kids and Families
Threat Research
Transnational