A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.

Slides:



Advertisements
Similar presentations
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Advertisements

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
3D Printing - A Double Edged Sword - How Can Businesses Manage Their Risk While Seizing The Opportunity? March
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
David A. Brown Chief Information Security Officer State of Ohio
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Information Security Policies Larry Conrad September 29, 2009.
Information Security Policies and Standards
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Risk Assessment Frameworks
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Trends in Corporate Social Responsibility Reporting
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Chapter Two Ethical & Legal Issues.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Green and Inclusive Business
 This presentation looks at: › What is risk management › How to identify risks › How to implement an effective risk management policy to increase your.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Intellectual Property in the Context of Growth and Development of the World Economy Luciano Daffarra, Attorney at Law Daffarra, d’Addio & Partners China-Italy.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Basic Definitions and Drivers (Sustainability Reporting) Introduction and scene setting.
“Mitigating Offshoring Risks in a Global Business Environment“
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Strategies for Innovation Sourcing 30 August 2007 Paul McGowan Center for Innovative Technology Herndon, VA / Strategies.
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Unfair Trade Practices: Conceptualisation, Significance and Regional Perspectives March 11, 2011.
CAS Spring Meeting June 2007 Introduction to ERM …The Measurements, Quadrants, Tools, and Solutions Prof. Mark C. Vonnahme Fox Family Clinical Professor.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
Albany Bank Corporation Security Incident Management Program.
Protecting your Managed Services Practice: Are you at Risk?
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
Managing Uncertainty, Creating Opportunity Enterprise Risk Management J. Brown, CEO.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Keynote 9: Cyber Security in Emerging C4I Systems: Deployment and Implementation Perspectives By Eric J. Eifert, Sr. VP of DarkMatter’s Managed Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
When things go wrong: reducing the risk of FCA enforcement action Birmingham 2016 Insurance and Financial Services Conference Wednesday, 18 June 2016 Jonathan.
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Physical Security Governance Model
Cybersecurity - What’s Next? June 2017
Data Minimization Framework
Public Facilities and Cyber Security
Business Counter-Intelligence
Compliance with hardening standards
COSO and ERM Committee of Sponsoring Organizations (COSO) is an organization dedicated to providing thought leadership and guidance on internal control,
United States Coast Guard Office of Port and Facility Compliance (CG-FAC) Cybersecurity and the Marine Transportation System.
Cyber defense management
Based on Oil & Gas Industry Averages
ITP Maturity Model Survey 2018
Cyber security Policy development and implementation
Trade Secrets 2018: International
Cybersecurity ATD technical
Work. Reimagined. Value Discovery Workshop
Strategic threat assessment
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations and think tanks Assessments and benchmarking to measure current processes/systems Guidance and steps for improvement Available in English, Chinese, Spanish and Brazilian Portuguese

4

Globalized Marketplace Information Digitalization Mobile Workforce Fragmented Value Chains

6

*CREATe and PwC: “Economic Impact of Trade Secret Theft: A framework for companies to safeguard trade secrets and mitigate potential threats

10 Category of Trade Secrets Product Information Research & Development Critical & Unique Business Processes Sensitive Business Information IT Systems & Applications Gather key stakeholders to identify trade secrets Group trade secrets into relevant categories Map trade secrets across physical and virtual locations To-dos:

Malicious Insiders Organized Crime Groups Nation States Hactivists Competitors Types of Threat Actor Access to sensitive company information through employment or relationships Cyber intrusions Social engineering Exploiting disgruntled employees Bribery Theft Cyber intrusions Bribery Theft Intelligence and Security Service Collection SOEs Regulations (patent enforcement

Impact Motivation Access Connections Red Flags Most common source of IP theft Ego, ideology, competition or financial gain Systems, records, source code, facilities Malware, malicious code, social engineering to exploit access Activity changes with business events, employee departure

“information which meets all the following requirements”: “is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question”; “has commercial value because it is a secret”; and “has been subject to reasonable steps under the circumstances, by the person lawfully in control of the information, to keep it secret.”

15

IDENTIFY 1. What risks does the company face? ASSESS 2. How serious are those risks? MANAGE 3. What steps should the company take to manage those risks? Cybersecurity Corporate Digital Assets Breach Trade Secrets or other IP Theft

Gain consensus across business units over definitions and criteria for determining IP that is a trade secret Create a prioritized, ranked list of trade secrets with location maps around the world Define a clear repeatable process for incorporating new innovations and trade secrets into the existing trade secrets list Use a proven formula for assessing the cost of trade secret theft at the company level Determine how to maximize the value of protective measures to ensure the greatest return on security investment Align people, processes and technology to ensure that trade secrets are secret and protected

MeasureImprove

Scores in each category; benchmarked against peers

5 Mature system covering all IP-related issues and focused on continual improvement 4 Systems are well developed and implemented 3 Systems approach; inconsistent implementation and monitoring 2 Limited, reactive systems 1 Little or no awareness or repeatable processes

Improvement Plan: Individual Recommendations Improvement Guide Broad range of tools, resources

Free Downloads Available at Trade Secrets: CREATe-PwC Report/Framework Protecting Trade Secrets with Supply Chain Partners Model Policies: Trade Secrets Protecting Intellectual Property Through Enterprise Risk Management (ERM) Model IP Policies Health and Safety Risks of Counterfeits in the Supply Chain

For more information about CREATe Leading Practices, please contact me at or our information desk at