YoVDO

Rob, Replicate and Replace - China’s Global Technology Theft and How to Confront It

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses National Security Courses Technology Policy Courses Insider Threats Courses

Course Description

Overview

Explore the critical issue of China's global technology theft and strategies to combat it in this 53-minute panel discussion from the RSA Conference. Gain insights from top U.S. security officials as they delve into the evolving cyberthreat landscape, the China Initiative, and the challenges posed by insider threats and cyber theft. Learn about red flags to watch for, recent indictments, and the impact of high-profile cases like the Huawei CFO arrest. Discover the role of counterintelligence strategies, the concept of non-traditional collectors, and the importance of protecting American innovation. Understand how other countries approach this issue, the significance of corporate security measures, and the enforcement of compliance controls. Examine the growing awareness among companies and the critical need to safeguard sensitive personal data in the face of persistent global technology theft attempts.

Syllabus

Introduction
Threat Landscape
China Initiative
The Threat
Insider Threat
Cyber Theft
Insider Threats
What are the red flags
The lethality of the force
The counterintelligence strategy
The nontraditional collector
Recent indictments
Blowback
Huawei CFO Arrest
General How Does It Help
The Problem
The General
QA Card
Other Countries
Huawei
Corporate Security
What do other countries do
Better Enforcement of Compliance
Controls at all depend on
We are trying again
American innovation
What can we do
Companies waking up
The indictments
Sensitive personal data


Taught by

RSA Conference

Related Courses

Justice and Equity in Technology Policy
University of Michigan via Coursera
DJ Patil: Ask Me Anything
LinkedIn Learning
What do we mean by digital health and social care?
OpenLearn
Safety By Design
RMIT University via FutureLearn
Security by Design
RMIT University via FutureLearn