I managed teams in India for years. Then I got APAC. Nothing worked. Same frameworks. Same playbooks. Same communication style. Different results. Mostly bad ones. I was running meetings the way I ran them in India. Direct. Fast. Agenda-driven. In some countries, it landed well. In others, I could feel the room go cold. Back then, someone gave me advice I didn't fully appreciate at the time: "Slow down. Understand how people here think. Business will follow." So I started paying attention. Asking questions. Watching what worked and what didn't. Today, I manage a team across 7 offices. We speak 11 languages. We serve customers in 12+ countries. Here's what I've learned about working across APAC: - In Japan, silence often means agreement. Precision matters more than speed. Never surprise anyone in a meeting. - In Korea, context is everything. Explain the "why" before the "what." Hierarchy shapes how feedback flows. - In Vietnam, people are direct. Candid. They'll tell you what's broken if you ask. - In Indonesia, harmony matters. Pushback is subtle. You have to read between the lines. - In Singapore, time is currency. Get to the point. Skip the preamble. - In India, silence in a meeting often means disagreement. Or confusion. Rarely agreement. Same region. Wildly different operating systems. The mistake I made early on? Assuming one style fits all. It doesn't. Cultural fluency isn't about being "sensitive." It's about being effective. What's one cultural nuance that took you time to understand?
Networking Etiquette
Explore top LinkedIn content from expert professionals.
-
-
How can we bridge the gap between cultures in Japan? I saw two worlds in one room. In one corner, Japanese groups gathered neatly, exchanging business cards. On the other, the international crowd was jumping into conversations, laughing, and sharing ideas. This dynamic wasn’t new to me. I’ve had chats with Japanese friends and colleagues who feel awkward about networking—whether it’s at events or just in everyday work situations. It made me wonder: Why does networking feel so different in Japan? It’s more than just personal preference. It’s a mix of cultural norms, history, and workplace traditions all playing a role. ↪︎ The lifetime employment mindset For decades, Japan’s career path followed one simple rule: Stick with one company, and they’ll take care of you for life. Networking outside your company? It was sometimes seen as disloyal. Even today, that mindset still feels familiar to many of us. Growing up, I often heard: “If you stay loyal, the company will take care of you.” That safety net isn’t guaranteed anymore. Yet, the hesitation to network is still there. ↪︎ Risk aversion & the need for structure (Nemawashi) “I’ll go if someone I know is going—it feels safer.” That line explains why approaching strangers feels unnatural for many Japanese people. It’s tied to nemawashi (根回し)—the quiet, behind-the-scenes consensus-building that happens before anything official. Like rehearsing before a show, everyone knows their role before the event even starts. Spontaneous networking? That’s pure improv. Without introductions or structure, it feels risky. That’s why business cards (meishi) aren’t just contact details—they’re a safety net providing context and reassurance. ↪︎ Social bonding happens elsewhere In Japan, the strongest connections aren’t made at networking events. They’re built over drinks at nomikai (after-work parties) or company outings like hanami (cherry blossom viewing). These settings offer structure—clear roles, established hierarchy, and a comfortable atmosphere. But when networking feels like a free-for-all, with no introductions or shared context, hesitation comes naturally. ▶︎ How can we make networking events more inclusive? Semi-structured activities with clear guidance, bilingual facilitators, and low-pressure settings can make networking feel less intimidating and way more genuine. I explored this more in the full article—would love to hear your thoughts: https://lnkd.in/g6NcfgXd P.S. Ever thought about the power of weak ties? The people who aren’t in your immediate circle—an old colleague, a LinkedIn contact, or someone you met once at an event. They’re the ones who open doors to new ideas and perspectives you’d never find on your own. I’m grateful for everyone who made me see that. And for the deeper connections I’ve been lucky enough to build along the way. What’s helped you navigate networking across cultures?
-
Safeguarding information while enabling collaboration requires methods that respect privacy, ensure accuracy, and sustain trust. Privacy-Enhancing Technologies create conditions where data becomes useful without being exposed, aligning innovation with responsibility. When companies exchange sensitive information, the tension between insight and confidentiality becomes evident. Cryptographic PETs apply advanced encryption that allows data to be analyzed securely, while distributed approaches such as federated learning ensure that knowledge can be shared without revealing raw information. The practical benefits are visible in sectors such as banking, healthcare, supply chains, and retail, where secure sharing strengthens operational efficiency and trust. At the same time, adoption requires balancing privacy, accuracy, performance, and costs, which makes strategic choices essential. A thoughtful approach begins with mapping sensitive data, selecting the appropriate PETs, and aligning them with governance and compliance frameworks. This is where technological innovation meets organizational responsibility, creating the foundation for trusted collaboration. #PrivacyEnhancingTechnologies #DataSharing #DigitalTrust #Cybersecurity
-
In meetings, you might hear phrases like "the data speaks for itself" or "we’re just looking at the facts." These statements can give the impression that data offers a neutral view of reality. But data is never completely neutral. Here’s why. Data reflects a world shaped by existing systems of power. Disparities in education, health, and incarceration show how these systems' social structures are maintained. However, it’s common to interpret disparities in social data as individual failures or successes. For example, someone’s health is often seen as a matter of personal responsibility. Yet no matter which data metric we use—whether deprivation, income, or education—there is a strong social SYSTEM gradient. The poorer you are, or the less education you have, or the more deprived your neighbourhood, the more likely you are to die younger and sicker. This pattern holds across almost every condition or disease. It is not shaped by individuals, but institutional systems of power. So, if you share data about people and communities, you have more responsibility than you might realise. You have the power to influence your peers, government decisions, and ultimately public opinion. By explaining the conditions that shape data, we make it harder for inequities to go unnoticed. To use data responsibly, we have to recognise its dual role. Data can be a mirror that reflects inequality and a magnifier that can make it worse if misinterpreted. ---- Kia ora, I'm Kat 👋 I wrote The Data Storyteller's Handbook. My next book exposes how powerful systems like racism, sexism, and classism shape not only our world but the data we rely on every day.
-
Navigating the Maze of Truth In a world where alternative facts often muddy the waters of truth, how can individuals and communities stay resilient and well-prepared for the challenges they face? As misinformation spreads and reliable news sources are sometimes overshadowed by sensationalism, maintaining resilience becomes not just a matter of personal vigilance but a collective responsibility. 1. Develop Critical Thinking Skills - In an era where alternative facts can easily infiltrate public discourse, honing critical thinking skills is essential. This means questioning the credibility of sources, cross-referencing information with multiple reputable outlets, and analyzing the motives behind the information being presented. Encourage a mindset that doesn’t just accept information at face value but actively seeks verification. 2. Prioritize Media Literacy - Educate yourself and others about media literacy. Understanding how media works, recognizing bias, and differentiating between fact-based journalism and opinion pieces are crucial skills. Schools, workplaces, and community organizations should incorporate media literacy training to empower individuals to navigate complex information landscapes effectively. 3. Seek Out Reliable Sources - Identify and rely on reputable news sources that adhere to strict journalistic standards. These sources prioritize accuracy, fairness, and transparency. Create a diverse media diet by following established institutions and experts in relevant fields. Avoid echo chambers by engaging with a variety of perspectives while focusing on sources known for their reliability. 4. Verify Information Before Sharing - Before sharing information on social media or within your community, take a moment to verify its authenticity. Use fact-checking websites and tools to confirm details and debunk myths. By being a responsible consumer and sharer of information, you contribute to reducing the spread of misinformation and helping others stay informed. 5. Advocate for Transparency and Accountability - Support and advocate for transparency and accountability in media and information sources. Encourage media outlets and public figures to adhere to high standards of accuracy and honesty. Demand accountability from those who spread misinformation and promote a culture of truthfulness in public discourse. Our collective resilience depends on our ability to discern truth from fiction. Equip yourself with the tools to critically evaluate information and promote media literacy in your community. Stay vigilant, stay informed, and together, let’s build a more resilient and informed society. #StayResilient #CriticalThinking #MediaLiteracy #VerifyBeforeYouShare #TruthMatters
-
BEYOND QUALITY: SECURING & GOVERNING DATA FOR ETHICAL USE A few weeks ago, I shared my experience tackling data quality issues in the oil & gas industry focusing on identifying and resolving inconsistencies, missing values, and compliance risks. But fixing data quality was only the first step. The bigger challenge was ensuring that this data remained secure, ethically shared, and regulatory compliant. As part of my project, I worked on a data-sharing scenario where an industry body required datasets to be provided to academic researchers. The issue? These datasets contained sensitive business information that couldn't be exposed carelessly. Upstream data had to align with OGA & NUPRC regulations, while corporate data needed to meet GDPR compliance to protect customer information. The risks of getting this wrong were significant: regulatory fines reaching €20M (GDPR) or £1M (OGA), potential competitive threats, and a loss of business trust due to weak governance. To address these challenges, I pseudonymized and anonymized sensitive data, ensuring that well IDs and customer records were masked while still retaining analytical value. I also encrypted files using AES-256, stored them securely with robust access controls and audit logs, and enforced Multi-Factor Authentication (MFA) and secure file transfers to prevent unauthorized access. Additionally, I drafted a Data Use Agreement (DUA) between bp and the University of Aberdeen to outline the terms for ethical and secure data usage. Working alongside my talented course mate Amarachi Grace Agiri, PMP® throughout this project has enriched the experience. Even though we were on different teams, our shared commitment to data quality and security made the experience truly enriching. This experience reinforced a crucial lesson: data quality is only as good as the security and governance surrounding it. It’s not just about accuracy, it’s about protecting and responsibly managing data in a way that ensures compliance and maintains trust. Now, I’m eager to dive deeper into enterprise-wide data governance strategies, exploring how security, compliance, and automation can be seamlessly integrated into industrial workflows. More importantly, I’m curious. How does your industry handle data security and governance? Let’s discuss! 👇 #DataQuality #DataSecurity #DataGovernance #OilAndGas #PetroleumData #GDPR #ISO27001 #Compliance #BigData #DigitalTransformation #EnergySector
-
The first question I expected from Saudi clients was "How much?" Instead, they asked "Who are you?" After months of pitching in Riyadh, I've noticed a fundamental difference in how agency-client relationships begin here versus in Western markets. While European clients typically lead with project parameters and budget discussions, Saudi decision-makers prioritize understanding you as a person before discussing any business. What appears as prolonged small talk – questions about my journey to Saudi, my family background, even my educational history – isn't casual conversation. It's a deliberate evaluation process where trust in you as an individual precedes trust in your company's capabilities. This relationship-first approach extends beyond initial meetings. One potential client invited me to three family gatherings before ever discussing our services. Another spent weeks establishing mutual connections before revealing project details. Western efficiency metrics would flag these interactions as "unproductive time" – but this couldn't be more wrong. The deep relationship foundation built during these exchanges creates client partnerships that withstand project challenges in ways transactional relationships simply can't. I've learned to adjust my approach accordingly: allocating more time for relationship development, bringing team members who excel at personal connection to meetings, and recognizing that the timeline from first contact to signed contract follows a completely different rhythm. For agencies entering this market, understanding this distinction isn't just cultural sensitivity – it's business strategy. The investment in relationship-building isn't separate from the work; it is the work. Have you experienced similar relationship-focused business cultures? How did you adapt your approach?
-
PIECES OF CHINA - Miànzi : Hierarchy and “face” in Chinese business culture If guanxi (关系) is the backbone of Chinese business culture, hierarchy and “face” (面子, miànzi) are its operating rules. Understanding how these concepts shape communication, negotiation, and decision-making is essential to building lasting partnerships in China. ▫️Hierarchy as structure Chinese organizations tend to emphasize hierarchy more strongly than their Western counterparts. Decision-making often sits at the top, and deference to authority is expected. In meetings, the most senior person usually speaks last, after subordinates have voiced their views. Titles, seating arrangements, and even the order of introductions matter. For a foreign partner, recognizing and respecting hierarchy is about showing cultural sensitivity. ▫️ The meaning of “face” (miànzi) “Face” is a core concept in Chinese society, encompassing respect, reputation, and dignity. To give someone face means to show recognition of their status or contribution. To cause someone to “lose face” (by contradicting them publicly, highlighting a mistake, or dismissing their opinion) can damage relationships and stall negotiations. Preserving face is therefore a critical part of business etiquette. ▫️ How it plays out in practice Communication : Chinese colleagues may avoid saying “no” directly, instead using more indirect phrasing to preserve harmony. Negotiations : Concessions are often presented in ways that allow both sides to save face, even if the outcome is asymmetrical. Conflict management : Criticism is usually delivered privately rather than in front of peers. Ceremony : Banquets, gift-giving, and symbolic gestures are ways to offer face and reinforce respect. ▫️The interaction with guanxi Guanxi builds the network of trust; face sustains it. A person with strong guanxi but who causes others to lose face will see relationships weaken. Conversely, someone who consistently gives face strengthens their guanxi over time. The two concepts are inseparable in the long-term building of business partnerships. ▫️ Why it matters for foreign companies For outsiders, it can be easy to underestimate these cultural codes. Western business culture often prizes bluntness, meritocracy, or “getting straight to the point.” In China, ignoring hierarchy or mismanaging face can undermine credibility, even if the business case is solid. Respecting seniority, communicating with tact, and being attentive to symbolic details are not optional extras but are part of the negotiation itself. 💡 My Piece of Advice: In China, business is not just about contracts, but about relationships. Respect hierarchy, protect face, and you will build the trust that makes deals possible. Ignore these rules, and even the strongest proposal may fail. ________ #PiecesofChina #BusinessCulture #Mianzi
-
As schools across South Africa prepare to reopen, many of us will share proud first-day moments online - school uniforms, backpacks, big smiles and milestones worth celebrating. However, this period also presents an important opportunity to pause and reflect on how we share our children online, particularly when posts include core personal identifiers. 'Sharenting' becomes a risk when content reveals a combination of a child's full name, school name, badge or uniform, grade or class information, daily routines or locations, or even clear facial images tied to identifiable text. Individually, these details may appear harmless, but collectively they create a traceable digital identity for a child - one they did not consent to and cannot control. In a South African context, this matters because digital safety risks are amplified by public visibility which can result in identity misuse or fraud, grooming and social engineering, and unauthorised data scraping. Children are particularly vulnerable when identifiers are publicly accessible. There are uneven digital literacy and safeguards where not all platforms, schools or communities operate with the same level of digital safety awareness or protection. Once content is shared, it can be copied, redistributed or repurposed beyond its original intended audience. We also need to be aware of AI and data misuse that are no longer abstract risks because the images and personal information shared publicly can be used to train AI systems without consent and stored indefinitely without our or the child's control. This is especially concerning for children whose digital footprints are being created years before they can understand or manage them. It's also imperative to remember that under the POPIA framework, children's personal information requires heightened care. While many sharenting practices are unintentional, they still raise important questions about consent, proportionality and long-term impact. Our children will grow up in a world where digital identity matters. As parents, leaders and professionals, we have a responsibility to ensure that identity is shaped with care, foresight and respect. As the school year begins, let's prioritise privacy, dignity and safety alongside pride, because protecting a child's data is also protecting and intentionally planning for their future.
-
I saw a post on Twitter recently that really made me pause. A woman had shared a picture of her child but later deleted it after noticing that people were bookmarking the post, which made her wonder why anyone would want to save a picture of her child. Even if some of those bookmarks were harmless, her decision to take them down was a smart one and a reminder of something we all need to think about more often, which is that privacy online matters a lot. We live in a time where sharing is second nature. A new baby, a fun trip, a promotion at work, it’s all out there in a matter of seconds. We often share parts of our lives online without fully considering who might be watching or why. But here’s the thing: not everything needs to be shared, especially when it involves personal or sensitive details. One crucial concept to understand here is personal identifiable information (PII). PII is any detail that can be used to identify you as an individual. It can be categorized into two types:📍 Non-sensitive PII, which includes information that is publicly accessible and generally not harmful if exposed. For example, your name, birthday, and gender. But in the wrong hands, they can still be used to build a bigger picture about you. 📍Sensitive PII involves information that is private and should be carefully protected. For example, bank verification details (BVN), driver's license, credit card details, medical records, etc. This is where things get serious, and this kind of information shouldn’t be floating around the internet, as it can open the door to identity theft, fraud, or worse. Not Everything Belongs on the Internet. It’s okay to be private. In fact, it’s smart. You can still be active online, share valuable content, and connect with others without giving away your entire life story. Sometimes, sharing just a part of the picture is enough to get your message across. Here are a few simple things you can do to protect your privacy: 📍Pause before you post. Ask yourself if the information really needs to be online. 📍Be curious. If someone’s asking for personal info, think: do they really need this? 📍Clean up regularly. Delete old posts that no longer serve a purpose. 📍Monitor your digital presence. Search your name online regularly to see what information is publicly available about you. Your digital footprint tells a story, and that story is valuable. But if you’re not paying attention, it can also make you vulnerable. Just as we protect ourselves from thieves in the physical world, we must be cautious of digital criminals too. These individuals don't need to point at you to cause harm. They can be miles away and still steal from you just by exploiting the information you carelessly shared. So, before you make that next post, ask yourself:Is this information really necessary to share? And is it worth the potential cost to my privacy? If this post resonated with you, share it with someone who needs the reminder.