Business leaders often do not understand the extent to which technology infrastructure and devices are compromised within Greater China. Attendees will discuss ideas on how we as technologists advise business leaders on the ethical and operational ramifications of maintaining the integrity of identities and data of an organization while doing business in China.
This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.
Please note you are only able to Schedule/Reserve one Birds of a Feather session.
This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.
Protecting Data & the Supply Chain Ecosystem Technology Infrastructure & Operations
case studies governance risk & compliance insider threats security operations
Share With Your Community