Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to use gamification & social learning to make your compliance training shine Jamal Watkins, Digital Learning Evangelist, Adobe Compliance challenges have increased in the post-pandemic world. The hybrid workforce adds an extra layer of complexity and importance to cyber securi... 3 months ago | 49 mins Network data security management in China, in Europe and Cross-border Marco Bettin (Italy China Chamber of Commerce); Vivian Wu &Francesca (Baker McKenzie); Carlo Accordi& Qi Guang ( CMI Italy) Data protection and network data security are now critical issues for most businesses when trading across international borders. Many businesses now o... 11 months ago | 62 mins Maximizing Mobility: How Containers Are Changing the Game Bill Doerrfeld, tech journalist; Kevin Jackson, Trilio; Michael Levan, kubernetes consultant Implementing a new technology infrastructure doesn’t need to mean leaving behind all your legacy applications — but it could, if your migration strate... 4 months ago | 56 mins Connecting Your CCMS To Your TMS Dave Ruane, Charles Dowdell, and Malin Lernmark > Host: Scott Abel A non-profit organization called Bridges to Prosperity uses data to see where to build bridges in places like Nicaragua, which helps grow income for c... 3 months ago | 56 mins Revealing Actionable Insights Through Trusted Location Data Dave Mosher, Senior Sales Engineer Geocoding provides the basis for any location intelligence analysis. Once you locate an address, you can begin to enrich that location with contextual... 1 year ago | 32 mins Revealing Actionable Insights Through Trusted Location Data Dave Mosher, Senior Sales Engineer Geocoding provides the basis for any location intelligence analysis. Once you locate an address, you can begin to enrich that location with contextual... 1 year ago | 32 mins Towards a Better Level of Protection of Personal Data Riwzi WUN, Partner, RHTLaw Asia, Singapore Against the backdrop of the growing importance of Data Protection and Cybersecurity in the New Normal, many countries in Asia have existing laws for p... 1 year ago | 24 mins Data Sovereignty - What’s the Big Fuss About? Dr. Hing-Yan LEE, Madhav CHABLANI, Stephanie King-Chung HUNG, Ts. Saiful Bakhtiar OSMAN Panel Discussion The term “data sovereignty” has often been used by stakeholders (including cloud service consumers, cloud service providers, sectora... 2 years ago | 41 mins Data Sovereignty - What’s the Big Fuss About? Dr. LEE Hing-Yan, Stephanie King-Chung HUNG, May-Ann LIM, Ian LIM There will be a live Q&A after the panel discussion. The term “data sovereignty” has often been used by stakeholders (including cloud service consu... 2 years ago | 49 mins Data Sovereignty in APAC – Impact and Implications May-Ann LIM (ED, Asia Cloud Computing Association, Singapore) The term “data sovereignty” has been used to cover a multitude of policy approaches, but what exactly does it mean? Join Executive Director of the Asi... 2 years ago | 25 mins Load more