MaxChengInformationServicesCollaborationSteveChang34years24yearsCIAThreatsRockwellBusinessCenterEvaChenTokyo,JapanTrustworthinessCustomerGlobalInnovationApril199813 CoreEmployeesCalifornia,USATransnationalThreatResearchCybersecurityETDG2FASocialEngineeringDataPrivacyPasswordGlobalTechnicalHQJennyChangThreatExpertsHomebuildingProgramTaipei,TaiwanRansomwareInternetSafety forKids andFamiliesGiveandMatchChangeMalwareTechnicalSupportVulnerabilitiesMaxChengInformationServicesCollaborationSteveChang34years24yearsCIAThreatsRockwellBusinessCenterEvaChenTokyo,JapanTrustworthinessCustomerGlobalInnovationApril199813 CoreEmployeesCalifornia,USATransnationalThreatResearchCybersecurityETDG2FASocialEngineeringDataPrivacyPasswordGlobalTechnicalHQJennyChangThreatExpertsHomebuildingProgramTaipei,TaiwanRansomwareInternetSafety forKids andFamiliesGiveandMatchChangeMalwareTechnicalSupportVulnerabilities

Trend Micro - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Max Cheng
  2. Information Services
  3. Collaboration
  4. Steve Chang
  5. 34 years
  6. 24 years
  7. CIA
  8. Threats
  9. Rockwell Business Center
  10. Eva Chen
  11. Tokyo, Japan
  12. Trustworthiness
  13. Customer
  14. Global
  15. Innovation
  16. April 1998
  17. 13 Core Employees
  18. California, USA
  19. Transnational
  20. Threat Research
  21. Cybersecurity
  22. ETDG
  23. 2FA
  24. Social Engineering
  25. Data Privacy
  26. Password
  27. Global Technical HQ
  28. Jenny Chang
  29. Threat Experts
  30. Homebuilding Program
  31. Taipei, Taiwan
  32. Ransomware
  33. Internet Safety for Kids and Families
  34. Give and Match
  35. Change
  36. Malware
  37. Technical Support
  38. Vulnerabilities