The theft of intellectual property costs U.S. companies $300 billion annually by some estimates.
Guess what? Your valuable intellectual property is already under attack.
In manufacturing, trade secrets are the coin of the realm. As an industry, we pour billions into research and development to produce the IP that becomes new marketable products – 3.9 percent of net sales is reinvested in innovation – the highest of any industry. Overall sector investment in R&D drives economic growth around the world. According to the Brookings Institute: 90 percent of patents, 68 percent of private R&D spending and 11 percent of U.S. GDP can be directly attributed to manufacturing.
Yet there remains a barrier to further market expansion – and it’s a burden borne by information technology.
Offshoring has complicated the job of trade secret protection for IT security professionals. Manufacturers continue to outsource skilled labor, research and qualified engineers where they are both abundant and affordable. Overseas suppliers and contractors require application access and information transfer across borders and geographies. In a world of distributed IP, procedures to both inventory and safeguard trade secrets have become exponentially more complex.
Here’s betting your confidential IP is sitting on the laptops and mobile devices of your staff and trusted partners in foreign countries.
Are you sure it’s completely safe?
If not, you might want to download my e-book covering 5 tips that will help you realize some quick wins in your own efforts.
Read the full series:
- The Threats to Your Trade Secrets are Real
- Why Offshoring Complicates IP Protection
- Calculating the True Cost of IP Theft
- Make the Case for Investment in Ongoing IP Protection
- How to Form an IP Risk Committee
- 7 Elements of a Holistic IP Protection Plan
- Defining Intellectual Property
- Lock up your IP and Control Access to it
- Discover the Weaknesses in Your IP Security
- Improve Your Ability to Detect Cyber-Attacks
5 Practical Tips to Protect Manufacturing Trade Secrets
Five key recommendations to help evaluate if your organization’s security program can protect your IP from cyber espionage attacks.
Related ArticlesIBM Employee, Linux Kernel Hacker, Charged with Spying for China
The U.S. Department of Justice filed charges against a 30 year-old IBM employee who absconded with source code IBM uses to manage cloud software.Defining Intellectual Property
Seventh in a Series from Former DuPont CISO on Trade Secret Protection for ManufacturersWIPOut: The Devastating Business Effects of Intellectual Property Theft
A recent 60 Minutes feature told of China’s current cyber-espionage campaign that stole one company’s intellectual property in its near entirety. As China’s campaign continues targeting U.S. companies across every industry, those companies must take steps to protect IP and preserve their competitive advantage.