YoVDO

Rob, Replicate and Replace - China’s Global Technology Theft and How to Confront It

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses National Security Courses Technology Policy Courses Insider Threats Courses

Course Description

Overview

Explore the critical issue of China's global technology theft and strategies to combat it in this 53-minute panel discussion from the RSA Conference. Gain insights from top U.S. security officials as they delve into the evolving cyberthreat landscape, the China Initiative, and the challenges posed by insider threats and cyber theft. Learn about red flags to watch for, recent indictments, and the impact of high-profile cases like the Huawei CFO arrest. Discover the role of counterintelligence strategies, the concept of non-traditional collectors, and the importance of protecting American innovation. Understand how other countries approach this issue, the significance of corporate security measures, and the enforcement of compliance controls. Examine the growing awareness among companies and the critical need to safeguard sensitive personal data in the face of persistent global technology theft attempts.

Syllabus

Introduction
Threat Landscape
China Initiative
The Threat
Insider Threat
Cyber Theft
Insider Threats
What are the red flags
The lethality of the force
The counterintelligence strategy
The nontraditional collector
Recent indictments
Blowback
Huawei CFO Arrest
General How Does It Help
The Problem
The General
QA Card
Other Countries
Huawei
Corporate Security
What do other countries do
Better Enforcement of Compliance
Controls at all depend on
We are trying again
American innovation
What can we do
Companies waking up
The indictments
Sensitive personal data


Taught by

RSA Conference

Related Courses

An Introduction to Cryptography
University of Leeds via FutureLearn
Fundamental of Cryptography
IGNOU via Swayam
Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy