Category: Cybersecurity

Ghosts in the Machine

Artificial Intelligence, Risks, and Regulation in the Financial Market

/ January 23, 2017

Electronic Chops: Unauthorized Use and Legal Risk Management in China

A company seal, or chop, is integral to the administration of a company and the key to legally authorize documentation in China. An electronic chop– the digital version of its physical counterpart– can be used for online transactions. However, electronic...

/ December 9, 2016

How Effective Chief Digital Officers Navigate Digital Transformations

By Heidrick & Struggles As mobile technology, constant connectivity, and data analytics become increasingly embedded in the fabric of daily life, few businesses have been left untouched. Digital disruption—the changes that result from applying new technology to goods or services—is not...

/ December 7, 2016

The 5 Levels of Information Security in China

While cybersecurity challenges have long affected foreign companies operating in China and raised concerns about discriminatory treatment of foreign products—particularly China’s recent push for “secure and controllable” technology—the beginnings of this trend can be traced to the early 1990s with...

/ December 5, 2016

Four Mistakes to Avoid When Hiring Your Next Information Security Chief

Arguably, no hire is more important today than chief information security officer. If that seems like an overstatement, then ask the board of directors of Target, Sony Pictures, Home Depot, J.P. Morgan, or any one of the long list of...

USCBC 2016 Membership Survey: The Business Environment in China

The US-China Business Council has released the key findings of its 2016 annual member survey. For the past 11 years, USCBC has polled its members on their business performance in China and their priority issues.

/ August 29, 2016

Cybersecurity best practices for the traveling executive: A Q&A with Crumpton Group’s Rick Doten

Rick Doten, Chief of Cyber and Information Security at the Crumpton Group, answers questions about cybersecurity best practices for executives traveling to China. Doten states that executives must be aware that all communications will be monitored when they are in...

/ August 29, 2016

How do China’s Information Security Laws Affect You?

The China Certification of Information Security (CCIS) mark is required for all information security products used by the Chinese state agencies, and is voluntary for other information security products. China Compulsory Certification, or CCC, is required for many international products...

/ August 26, 2016

China, U.S. Talk Norms in Cyberspace – What Do They Mean?

Experts from China and the United States recently met in Washington in the first formal sessions of the Senior Experts Group on International Norms and Related Issues and had ‘”positive, in-depth and constructive” discussions regarding state behavior in cyberspace, as...

/ June 10, 2016

As China pushes semiconductor industry, cybersecurity and politics push back

More than 90 percent of the semiconductors that China purchases are imported from the United States, South Korea, Japan, and Taiwan. As a result, China spends more money importing semiconductors than it does oil. Over the next decade, China plans...

/ April 4, 2016