Rob, Replicate and Replace - China’s Global Technology Theft and How to Confront It
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the critical issue of China's global technology theft and strategies to combat it in this 53-minute panel discussion from the RSA Conference. Gain insights from top U.S. security officials as they delve into the evolving cyberthreat landscape, the China Initiative, and the challenges posed by insider threats and cyber theft. Learn about red flags to watch for, recent indictments, and the impact of high-profile cases like the Huawei CFO arrest. Discover the role of counterintelligence strategies, the concept of non-traditional collectors, and the importance of protecting American innovation. Understand how other countries approach this issue, the significance of corporate security measures, and the enforcement of compliance controls. Examine the growing awareness among companies and the critical need to safeguard sensitive personal data in the face of persistent global technology theft attempts.
Syllabus
Introduction
Threat Landscape
China Initiative
The Threat
Insider Threat
Cyber Theft
Insider Threats
What are the red flags
The lethality of the force
The counterintelligence strategy
The nontraditional collector
Recent indictments
Blowback
Huawei CFO Arrest
General How Does It Help
The Problem
The General
QA Card
Other Countries
Huawei
Corporate Security
What do other countries do
Better Enforcement of Compliance
Controls at all depend on
We are trying again
American innovation
What can we do
Companies waking up
The indictments
Sensitive personal data
Taught by
RSA Conference
Related Courses
Justice and Equity in Technology PolicyUniversity of Michigan via Coursera DJ Patil: Ask Me Anything
LinkedIn Learning What do we mean by digital health and social care?
OpenLearn Safety By Design
RMIT University via FutureLearn Security by Design
RMIT University via FutureLearn