Max Cheng Information Services Collaboration Steve Chang 34 years 24 years CIA Threats Rockwell Business Center Eva Chen Tokyo, Japan Trustworthiness Customer Global Innovation April 1998 13 Core Employees California, USA Transnational Threat Research Cybersecurity ETDG 2FA Social Engineering Data Privacy Password Global Technical HQ Jenny Chang Threat Experts Homebuilding Program Taipei, Taiwan Ransomware Internet Safety for Kids and Families Give and Match Change Malware Technical Support Vulnerabilities Max Cheng Information Services Collaboration Steve Chang 34 years 24 years CIA Threats Rockwell Business Center Eva Chen Tokyo, Japan Trustworthiness Customer Global Innovation April 1998 13 Core Employees California, USA Transnational Threat Research Cybersecurity ETDG 2FA Social Engineering Data Privacy Password Global Technical HQ Jenny Chang Threat Experts Homebuilding Program Taipei, Taiwan Ransomware Internet Safety for Kids and Families Give and Match Change Malware Technical Support Vulnerabilities
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Max Cheng
Information Services
Collaboration
Steve Chang
34 years
24 years
CIA
Threats
Rockwell Business Center
Eva Chen
Tokyo, Japan
Trustworthiness
Customer
Global
Innovation
April 1998
13 Core Employees
California, USA
Transnational
Threat Research
Cybersecurity
ETDG
2FA
Social Engineering
Data Privacy
Password
Global Technical HQ
Jenny Chang
Threat Experts
Homebuilding Program
Taipei, Taiwan
Ransomware
Internet Safety for Kids and Families
Give and Match
Change
Malware
Technical Support
Vulnerabilities