China: Creating Partnerships and Preventing Cyberattacks

CSO Magazine and Cylance® Present: “China – Creating Business Partnerships and Preventing Cyberattacks”

For business leaders, it is difficult to ignore the opportunity to access China’s enormous, fast-growing economy for both enterprise and consumer products. With that opportunity comes exposure to a complex web of issues. Most executives know very little about how the political, cultural, and cybersecurity landscape in China may impact their ability to safely conduct business. To provide a roadmap to the current climate in China, Cylance has teamed with CSO Magazine for a discussion with a leading expert on conducting business in China, Anja Manuel, and Cylance’s Chief Security and Trust Officer, Malcolm Harkins. The conversation is moderated by CSO Publisher Bob Bragdon. 

In this first on-demand webinar of a three-part series titled, “China – Creating Business Partnerships and Preventing Cyberattacks”, Anja and Malcolm offer timely and well-informed insights for business leaders to consider as they weigh the pros and cons of entering the Chinese market.

The discussion begins with the importance of China as a trading partner and their notorious reputation for stealing intellectual property (IP). Anja then touches on how the new U.S. President is making progress with Chinese President Xi, but there are still many key issues on the table. That serves as a segue to the relationship between North Korea and China, where tensions are high, but North Korea continues to be reliant on China for 90% of its trade.

The next topic is the ever-present issue of censorship in China and how it is becoming stricter under President Xi. Censorship can have a negative impact on how business is conducted, as many companies rely on the Internet to transact commerce and share information. Cultural differences and corporate culture can similarly impact an organization’s ability to be successful in China.

(Read more...)

This is a Security Bloggers Network syndicated blog post authored by The Cylance Team. Read the original post at: Cylance Blog