SlideShare a Scribd company logo
1 / 25
Cyber Security
Compliance Solutions
for Foreign Companies
in China
2 / 25
Content
Key Regulatory Risks for Foreign Companies in China
Alibaba Cloud’s Compliance Solutions
01
02
3 / 25
When We Think of Cybersecurity Compliance
• A Grey Rhino: Increasingly Heavy Pressure on
legal, GR, and PR.
• A Disastrous Outcome: Serious fines and
penalties for cybersecurity regulation violation.
• A Must-do: Increasingly large investments in
compliance.
• A Rewarding Investment: Investment on
compliance is necessary and rewarding.
No Local Entity
No ICP License
Data Cross-border
Cybersecurity
Compliance
4 / 25
Increasingly Heavy Pressure for Foreign Enterprises
Legal: Leading tech companies have been investigated
GR: Focus point of both the central
and local authorities
PR: Medias are keen to cover cybersecurity
related cases.
5 / 25
Real case for Fines and Penalties
A fine between RMB
50,000 - 500,000. A
temporary suspension of
operations, closing of
website, and cancellation
of business licenses.
A fine between RMB
50,000 - 500,000.
A fine between RMB
10,000 to 50,000.
A fine between one and
ten times the amount of
the unlawful gains
A fine between RMB
50,000 - 500,000. A
temporary suspension of
operations, closing of
website, and cancellation
of business licenses.
Suspension of operations usually starts from 6 months.
Act. 59 Act. 60 Act. 61 Act. 64 Act. 68
Fail to perform
network
security protection
duties
Fail to immediately take
remedial measures for
Security flaws and
vulnerabilities
Fail to require users to
provide truthful identity
information
Infringe on personal
information
Fail to stop the
transmission of
prohibited
information
6 / 25
Trend - Global companies are stepping up investment in compliance
Public Policy Stay updated with policies and regulations, and consult with local experts
Content Security Strengthen ability to recognize prohibited information
Business Licensing Establish data center in China or work with local cloud service providers
PI Protection Higher data protection standards
Data Cross-border Transfer Store data in China and transfer overseas after proper risk assessment
Increase investment in training, management and facilitiesNetwork Security
7 / 25
Compliance is the most rewarding investment in global markets
Alibaba
Cloud
Solution
Lower
TCO
Reduce
Risk
Effective
Business
Growth
Reduce
Legal Risk
More
Competitive
8 / 25
You Need One-Stop-Shop for Go-China Compliance
Public Policy Expert Team
Alibaba Cloud CSL ready
One-Stop Compliance
Solution
Security Product and
Compliance Consulting
Services
9 / 25
Local Business Consulting
Local entity registration
ICP filing/licensing
Overview of Alibaba Cloud Cyber Security Law Compliance Solutions
Network Security Risk Management
• Vulnerability management and repair
• Virus and cyber attack prevention
• Personnel training
• Network logs storage
• Emergency Response
Data Cross-border Transfer Risk Management
• Data cross-border transfer consulting service
• Data cross-border transfer self-assessment consulting
• Data cross-border transfer authority assessment
consulting
Personal Information Protection
• Real identity verification
• Data encryption
• Data leakage prevention
Information Compliance
• Prohibited image recognition
• Prohibited text recognition
• Video and live streaming solutions
• Social media and e-commerce solutions
10 / 25
Network Security Risk Management
11 / 25
Management System, Technology & Tools, Security Awareness are 3 key factors of Cybersecurity Law
compliance framework.
Cybersecurity Law
Network Security - Alibaba Cloud Service
Chapter 1 Overview
Chapter 2 Network Security
Chapter 6 Legal liabilities
Chapter 7 Appendix
Chapter 5 Monitoring and Contingency plan
C3 Network Operation Security
2.1
General
2.2
Infra Security
A 21
Overall security requirements
A. 31,32 and 39
Infra Requirement
A 37
Data Retention
A.22~23
Network and Security
Product Supply Chain
A 43,44 and 46
Responsibility of Personnel
and Org
A45, 50
Network Security
A 40~42
Personal information
protection
C4 Network Information
Security
Mgt
Parties
Threat Alert
Growth Operation Risk Mgt Regulation
Alibaba CSL Compliance Service
Network ResilienceNetwork Security
Employee Client3rdProcess Data Attacker
Network Security Strategy & Management
……
-Infra
-ID Mgt
-App Security
-HR Security
-Privacy
-Vulnerability
-Cloud
-3rd Party
-Physical
- TI
-SOC
- APT
- Ransomware
-Drill Testing
- Incident Response
- BCP
LawAsset
Process
Tech Skill
12 / 25
Network Security - Alibaba Cloud Security Product Family
Data Center Alibaba Cloud
Pentest Bug Bounty
After SIEM
Intermediate IDS, IPS Security Awareness
Before Vulnerability Scanner
Host Anti-Virus Software Server Guard
Network DDoS Mitigation Appliance DDoS Mitigation Service
Web Application WAF Appliance Cloud WAF
ACL Firewall Appliance
VPC
Security Group
13 / 25
• Alibaba Cloud
- Host Security: Server Guard
- Network Security: Anti-DDoS, WAF
• Customer Data Center
Network Security - Anti-Virus & Vulnerability Management
Solution
Customer Value
• Easy Management
• Lower Operation Cost
14 / 25
• Deliver emergency response solutions for clients, including
drill testing plan, policy configuration plan, etc.
• Provide incident analysis report and remediation plan.
Network Security - Emergency Response
Solution
Customer Value
• One-stop service.
• Experts with multiple domain knowledge.
15 / 25
Information Compliance & Content Security
16 / 25
Alibaba Cloud Information Compliance - Provide image, text and video recognition based on Alibaba Big Data
technology to protect your brand from association with illicit or otherwise illegal and brand damaging activity.
Information Compliance- Alibaba Cloud Offering
2015 2016 2017
• Pornography Detection
• OCR
• Text Recognition
• Video Recognition
Video Pornography
• CDN Detection
• OSS API Detection
• Frame based image detection
Image Pornography
• OSS Image Pornography
Detection
• Pornography Detection API
• Sensitive Graph
• Sensitive Content
• SPAM
• Branding Logo
• Audio Recognition
• Customized Service
17 / 25
Advertisement
Scenario:
UGC related,Icon/Album/ IM Pictures
Highlighted feature:
1. Multi-Layer Filtering
2. Variety detection
Information Compliance - Text Recognition
OCRQR Code Anti-SPAM
SPAM: Yes
Type: IM Contact
18 / 25
Personal Information Protection Solutions
19 / 25
Base on user-submitted information, Real Identity Verification is a ID authentication solution that leverage on
Alibaba bio and big data risk management model to detect ID fraud activities.
Personal Information Protection - Real Identity Verification
ID Authentication
• Name and ID Pair
Matching
• OCR support
Facial Recognition
• Static Comparison
• Interactive Authentication
Fake ID Auth
• Identify fraud ID, Phone
No and devices.
• High performance check
on known database.
20 / 25
Personal Information Protection - Data Encryption
21 / 25
Personal Information Protection - Anti-Hacking
0day Mitigation
Anti-bot service
Data Leakage Protection
Find vulnerability in your system
by community white hat.
Risk overview of your
network and assets.
Vulnerability Management
Assets Management
Incident response
and 7X24 services.
22 / 25
Data Cross-border Transfer Risk Management
23 / 25
Definition
Typical Scenarios
Data Cross-border Transfer: Personal information or important data collected or generated
domestically by network operator sending to oversea company, organization or individual using
network or other methods.
Data Cross - border Risk Management
• Your local office sends client information collected domestically to oversea HQ.
• Your local office sends Chinese employees’information to oversea HQ for management purpose.
• Your clients send data to oversea regions using your platform.
• Your local office sends client information to overseas third party consulting/ audit firm or contractor.
24 / 25
Data Cross - border Risk Management
Data Cross-Border
Legitimacy and Legality
Risk Management
Allowed
Two-tiered Assessment
• Conditions for self and
authorities assessment
• Definition of legitimacy
and legality
• Risk management
• Responsibility boundaries
• Managing risks after data
is transferred overseas
Pain points our experts
help address
Alibaba Cloud Data Cross-
border Risk Management
Data Cross-Border Authority
Assessment Consulting
Data Cross-Border Self-
Assessment Consulting
Data Cross-Border Overall
Risk Evaluation
25 / 25

More Related Content

What's hot

How To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWSHow To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWS
Amazon Web Services
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
RightScale
 
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
Amazon Web Services
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
Amazon Web Services
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business Services
Amazon Web Services
 
RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...
RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...
RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...
RightScale
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSLahav Savir
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Amazon Web Services
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Amazon Web Services
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
Amazon Web Services
 
F5 on AWS: How MailControl Improved their Application Visbility and Security
F5 on AWS:  How MailControl Improved their Application Visbility and Security F5 on AWS:  How MailControl Improved their Application Visbility and Security
F5 on AWS: How MailControl Improved their Application Visbility and Security
Amazon Web Services
 
Cloud Migration for Financial Services - Toronto - October 2016
Cloud Migration for Financial Services - Toronto - October 2016Cloud Migration for Financial Services - Toronto - October 2016
Cloud Migration for Financial Services - Toronto - October 2016
Amazon Web Services
 
Innovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your BusinessInnovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your Business
Amazon Web Services
 
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Amazon Web Services
 
How AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueHow AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and Revenue
Amazon Web Services
 
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Amazon Web Services
 
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Amazon Web Services
 
Transforming Challenger Using the Cloud
Transforming Challenger Using the CloudTransforming Challenger Using the Cloud
Transforming Challenger Using the Cloud
Amazon Web Services
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
Rolf Koski
 

What's hot (20)

How To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWSHow To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWS
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business Services
 
RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...
RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...
RightScale Webinar: Hybrid-IT: Connecting Your On-Premises Infrastructure Wit...
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWS
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
F5 on AWS: How MailControl Improved their Application Visbility and Security
F5 on AWS:  How MailControl Improved their Application Visbility and Security F5 on AWS:  How MailControl Improved their Application Visbility and Security
F5 on AWS: How MailControl Improved their Application Visbility and Security
 
Cloud Migration for Financial Services - Toronto - October 2016
Cloud Migration for Financial Services - Toronto - October 2016Cloud Migration for Financial Services - Toronto - October 2016
Cloud Migration for Financial Services - Toronto - October 2016
 
Innovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your BusinessInnovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your Business
 
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
 
How AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueHow AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and Revenue
 
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
 
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
 
Transforming Challenger Using the Cloud
Transforming Challenger Using the CloudTransforming Challenger Using the Cloud
Transforming Challenger Using the Cloud
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 

Similar to Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba Cloud

MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
Imperva
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Ulf Mattsson
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
ssuser8717cc
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
Alibaba Cloud
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
North Texas Chapter of the ISSA
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
Ethos Media S.A.
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
Clio - Cloud-Based Legal Technology
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
SaraPia5
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
Scalar Decisions
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
DLP
DLPDLP
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
Symantec
 
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian ScilleITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
Martin Thompson
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 

Similar to Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba Cloud (20)

MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
DLP
DLPDLP
DLP
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian ScilleITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
 

More from Alibaba Cloud

Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is Essential
Alibaba Cloud
 
Getting Started with Elasticsearch
Getting Started with ElasticsearchGetting Started with Elasticsearch
Getting Started with Elasticsearch
Alibaba Cloud
 
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to ThinkAlibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud
 
Loan Default Prediction with Machine Learning
Loan Default Prediction with Machine LearningLoan Default Prediction with Machine Learning
Loan Default Prediction with Machine Learning
Alibaba Cloud
 
Protecting Your Big Data on the Cloud
Protecting Your Big Data on the CloudProtecting Your Big Data on the Cloud
Protecting Your Big Data on the Cloud
Alibaba Cloud
 
Next Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best PracticesNext Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best Practices
Alibaba Cloud
 
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail CloudThe Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
Alibaba Cloud
 
Big Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data IntegrationBig Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data Integration
Alibaba Cloud
 
Migration to Alibaba Cloud
Migration to Alibaba CloudMigration to Alibaba Cloud
Migration to Alibaba Cloud
Alibaba Cloud
 
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the CloudHow to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
Alibaba Cloud
 
Big Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data VisualizationBig Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data Visualization
Alibaba Cloud
 
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Alibaba Cloud
 
Launch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with MagentoLaunch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with Magento
Alibaba Cloud
 
Responding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database TechnologyResponding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database Technology
Alibaba Cloud
 
How to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba CloudHow to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba Cloud
Alibaba Cloud
 
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load BalancerDiscovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer
Alibaba Cloud
 
Introduction to WAF and Network Application Security
Introduction to WAF and Network Application SecurityIntroduction to WAF and Network Application Security
Introduction to WAF and Network Application Security
Alibaba Cloud
 
How to Leverage Big Data to Deliver Smart Logistics
How to Leverage Big Data to Deliver Smart LogisticsHow to Leverage Big Data to Deliver Smart Logistics
How to Leverage Big Data to Deliver Smart Logistics
Alibaba Cloud
 
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017
Alibaba Cloud
 
AliCloud Object Storage Service (OSS) Core Features
AliCloud Object Storage Service (OSS) Core FeaturesAliCloud Object Storage Service (OSS) Core Features
AliCloud Object Storage Service (OSS) Core Features
Alibaba Cloud
 

More from Alibaba Cloud (20)

Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is Essential
 
Getting Started with Elasticsearch
Getting Started with ElasticsearchGetting Started with Elasticsearch
Getting Started with Elasticsearch
 
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to ThinkAlibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
 
Loan Default Prediction with Machine Learning
Loan Default Prediction with Machine LearningLoan Default Prediction with Machine Learning
Loan Default Prediction with Machine Learning
 
Protecting Your Big Data on the Cloud
Protecting Your Big Data on the CloudProtecting Your Big Data on the Cloud
Protecting Your Big Data on the Cloud
 
Next Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best PracticesNext Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best Practices
 
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail CloudThe Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
 
Big Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data IntegrationBig Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data Integration
 
Migration to Alibaba Cloud
Migration to Alibaba CloudMigration to Alibaba Cloud
Migration to Alibaba Cloud
 
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the CloudHow to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
 
Big Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data VisualizationBig Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data Visualization
 
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
 
Launch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with MagentoLaunch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with Magento
 
Responding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database TechnologyResponding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database Technology
 
How to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba CloudHow to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba Cloud
 
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load BalancerDiscovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer
Discovering Cloud Networking: VPC, VPN, Express Connect & Server Load Balancer
 
Introduction to WAF and Network Application Security
Introduction to WAF and Network Application SecurityIntroduction to WAF and Network Application Security
Introduction to WAF and Network Application Security
 
How to Leverage Big Data to Deliver Smart Logistics
How to Leverage Big Data to Deliver Smart LogisticsHow to Leverage Big Data to Deliver Smart Logistics
How to Leverage Big Data to Deliver Smart Logistics
 
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017
China Connect Webinar: ChinaConnect: How to Apply for an ICP License in 2017
 
AliCloud Object Storage Service (OSS) Core Features
AliCloud Object Storage Service (OSS) Core FeaturesAliCloud Object Storage Service (OSS) Core Features
AliCloud Object Storage Service (OSS) Core Features
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 

Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba Cloud

  • 1. 1 / 25 Cyber Security Compliance Solutions for Foreign Companies in China
  • 2. 2 / 25 Content Key Regulatory Risks for Foreign Companies in China Alibaba Cloud’s Compliance Solutions 01 02
  • 3. 3 / 25 When We Think of Cybersecurity Compliance • A Grey Rhino: Increasingly Heavy Pressure on legal, GR, and PR. • A Disastrous Outcome: Serious fines and penalties for cybersecurity regulation violation. • A Must-do: Increasingly large investments in compliance. • A Rewarding Investment: Investment on compliance is necessary and rewarding. No Local Entity No ICP License Data Cross-border Cybersecurity Compliance
  • 4. 4 / 25 Increasingly Heavy Pressure for Foreign Enterprises Legal: Leading tech companies have been investigated GR: Focus point of both the central and local authorities PR: Medias are keen to cover cybersecurity related cases.
  • 5. 5 / 25 Real case for Fines and Penalties A fine between RMB 50,000 - 500,000. A temporary suspension of operations, closing of website, and cancellation of business licenses. A fine between RMB 50,000 - 500,000. A fine between RMB 10,000 to 50,000. A fine between one and ten times the amount of the unlawful gains A fine between RMB 50,000 - 500,000. A temporary suspension of operations, closing of website, and cancellation of business licenses. Suspension of operations usually starts from 6 months. Act. 59 Act. 60 Act. 61 Act. 64 Act. 68 Fail to perform network security protection duties Fail to immediately take remedial measures for Security flaws and vulnerabilities Fail to require users to provide truthful identity information Infringe on personal information Fail to stop the transmission of prohibited information
  • 6. 6 / 25 Trend - Global companies are stepping up investment in compliance Public Policy Stay updated with policies and regulations, and consult with local experts Content Security Strengthen ability to recognize prohibited information Business Licensing Establish data center in China or work with local cloud service providers PI Protection Higher data protection standards Data Cross-border Transfer Store data in China and transfer overseas after proper risk assessment Increase investment in training, management and facilitiesNetwork Security
  • 7. 7 / 25 Compliance is the most rewarding investment in global markets Alibaba Cloud Solution Lower TCO Reduce Risk Effective Business Growth Reduce Legal Risk More Competitive
  • 8. 8 / 25 You Need One-Stop-Shop for Go-China Compliance Public Policy Expert Team Alibaba Cloud CSL ready One-Stop Compliance Solution Security Product and Compliance Consulting Services
  • 9. 9 / 25 Local Business Consulting Local entity registration ICP filing/licensing Overview of Alibaba Cloud Cyber Security Law Compliance Solutions Network Security Risk Management • Vulnerability management and repair • Virus and cyber attack prevention • Personnel training • Network logs storage • Emergency Response Data Cross-border Transfer Risk Management • Data cross-border transfer consulting service • Data cross-border transfer self-assessment consulting • Data cross-border transfer authority assessment consulting Personal Information Protection • Real identity verification • Data encryption • Data leakage prevention Information Compliance • Prohibited image recognition • Prohibited text recognition • Video and live streaming solutions • Social media and e-commerce solutions
  • 10. 10 / 25 Network Security Risk Management
  • 11. 11 / 25 Management System, Technology & Tools, Security Awareness are 3 key factors of Cybersecurity Law compliance framework. Cybersecurity Law Network Security - Alibaba Cloud Service Chapter 1 Overview Chapter 2 Network Security Chapter 6 Legal liabilities Chapter 7 Appendix Chapter 5 Monitoring and Contingency plan C3 Network Operation Security 2.1 General 2.2 Infra Security A 21 Overall security requirements A. 31,32 and 39 Infra Requirement A 37 Data Retention A.22~23 Network and Security Product Supply Chain A 43,44 and 46 Responsibility of Personnel and Org A45, 50 Network Security A 40~42 Personal information protection C4 Network Information Security Mgt Parties Threat Alert Growth Operation Risk Mgt Regulation Alibaba CSL Compliance Service Network ResilienceNetwork Security Employee Client3rdProcess Data Attacker Network Security Strategy & Management …… -Infra -ID Mgt -App Security -HR Security -Privacy -Vulnerability -Cloud -3rd Party -Physical - TI -SOC - APT - Ransomware -Drill Testing - Incident Response - BCP LawAsset Process Tech Skill
  • 12. 12 / 25 Network Security - Alibaba Cloud Security Product Family Data Center Alibaba Cloud Pentest Bug Bounty After SIEM Intermediate IDS, IPS Security Awareness Before Vulnerability Scanner Host Anti-Virus Software Server Guard Network DDoS Mitigation Appliance DDoS Mitigation Service Web Application WAF Appliance Cloud WAF ACL Firewall Appliance VPC Security Group
  • 13. 13 / 25 • Alibaba Cloud - Host Security: Server Guard - Network Security: Anti-DDoS, WAF • Customer Data Center Network Security - Anti-Virus & Vulnerability Management Solution Customer Value • Easy Management • Lower Operation Cost
  • 14. 14 / 25 • Deliver emergency response solutions for clients, including drill testing plan, policy configuration plan, etc. • Provide incident analysis report and remediation plan. Network Security - Emergency Response Solution Customer Value • One-stop service. • Experts with multiple domain knowledge.
  • 15. 15 / 25 Information Compliance & Content Security
  • 16. 16 / 25 Alibaba Cloud Information Compliance - Provide image, text and video recognition based on Alibaba Big Data technology to protect your brand from association with illicit or otherwise illegal and brand damaging activity. Information Compliance- Alibaba Cloud Offering 2015 2016 2017 • Pornography Detection • OCR • Text Recognition • Video Recognition Video Pornography • CDN Detection • OSS API Detection • Frame based image detection Image Pornography • OSS Image Pornography Detection • Pornography Detection API • Sensitive Graph • Sensitive Content • SPAM • Branding Logo • Audio Recognition • Customized Service
  • 17. 17 / 25 Advertisement Scenario: UGC related,Icon/Album/ IM Pictures Highlighted feature: 1. Multi-Layer Filtering 2. Variety detection Information Compliance - Text Recognition OCRQR Code Anti-SPAM SPAM: Yes Type: IM Contact
  • 18. 18 / 25 Personal Information Protection Solutions
  • 19. 19 / 25 Base on user-submitted information, Real Identity Verification is a ID authentication solution that leverage on Alibaba bio and big data risk management model to detect ID fraud activities. Personal Information Protection - Real Identity Verification ID Authentication • Name and ID Pair Matching • OCR support Facial Recognition • Static Comparison • Interactive Authentication Fake ID Auth • Identify fraud ID, Phone No and devices. • High performance check on known database.
  • 20. 20 / 25 Personal Information Protection - Data Encryption
  • 21. 21 / 25 Personal Information Protection - Anti-Hacking 0day Mitigation Anti-bot service Data Leakage Protection Find vulnerability in your system by community white hat. Risk overview of your network and assets. Vulnerability Management Assets Management Incident response and 7X24 services.
  • 22. 22 / 25 Data Cross-border Transfer Risk Management
  • 23. 23 / 25 Definition Typical Scenarios Data Cross-border Transfer: Personal information or important data collected or generated domestically by network operator sending to oversea company, organization or individual using network or other methods. Data Cross - border Risk Management • Your local office sends client information collected domestically to oversea HQ. • Your local office sends Chinese employees’information to oversea HQ for management purpose. • Your clients send data to oversea regions using your platform. • Your local office sends client information to overseas third party consulting/ audit firm or contractor.
  • 24. 24 / 25 Data Cross - border Risk Management Data Cross-Border Legitimacy and Legality Risk Management Allowed Two-tiered Assessment • Conditions for self and authorities assessment • Definition of legitimacy and legality • Risk management • Responsibility boundaries • Managing risks after data is transferred overseas Pain points our experts help address Alibaba Cloud Data Cross- border Risk Management Data Cross-Border Authority Assessment Consulting Data Cross-Border Self- Assessment Consulting Data Cross-Border Overall Risk Evaluation