Technology Strategies and Tactics for Doing Business in Greater China


Posted on in Presentations

Business leaders often do not understand the extent to which technology infrastructure and devices are compromised within Greater China. Attendees will discuss ideas on how we as technologists advise business leaders on the ethical and operational ramifications of maintaining the integrity of identities and data of an organization while doing business in China.


This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Please note you are only able to Schedule/Reserve one Birds of a Feather session.

This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Aaron Turner

Facilitator, Participant

CEO and Founder, Siriux Security

Protecting Data & the Supply Chain Ecosystem Technology Infrastructure & Operations

case studies governance risk & compliance insider threats security operations


Topic

Subtopic


Share With Your Community