• QuickRead Top Story - Valuation/Appraisal

    Cost Approach to Intellectual Property Valuation

    Part I: Conceptual Principles This is a four-part article series. The articles and discussion focus on the conceptual principles and the practical applications of the cost approach in the development of intellectual property valuations. Part I of this discussion focuses on the conceptual principles that support the application of the cost approach to intellectual property valuation. Part II describes the generally accepted cost approach valuation methods. Part III describes the practical measurement procedures related to intellectual property cost metrics and obsolescence metrics. Part IV presents several illustrative examples of the application of the cost approach in hypothetical intellectual property valuation…

  • QuickPress

    IBDs in Slow-Footed Race to Let Advisors Text Clients

    Firms largely ban texting, even for logistical purposes, amid guidance from FINRA that all business communications must be “retained, retrievable, and supervised.”  Securities America this week became the first of the top 10 largest IBDs to announce a program allowing its advisors to text clients. To read the full article in FinancialPlanning, click: IBDs in Slow-Footed Race to Let Advisors Text Clients.

  • Litigation Consulting - QuickRead Featured

    Identifying and Calculating Recoverable Damages in Cyber Security Breaches—Part 2

    Predicting Cyber Security Breaches Cyber security breaches often result in the improper transfer of personal identifying information or sensitive financial and health information. This article focuses on the identification of potential cyber security breaches and how courts are addressing the presentation of such cases, including the issue of damages. Read Identifying and Calculating Recoverable Damages in Cyber Security Breaches—Part 1

  • Litigation Consulting - QuickRead Featured

    Identifying and Calculating Recoverable Damages in Cyber Security Breaches—Part 1

    Predicting cyber security breaches Cyber security breaches often result in the improper transfer of personal identifying information or sensitive financial and health information. This article focuses on the identification of potential cyber security breaches and how courts are addressing the presentation of such cases, including the issue of damages.

  • Forensic Accounting - QuickPress

    Forensics Trends for 2013 —Government Info Security

    External Attacks, Data Loss are Top Concerns Jeffrey Roman at Government Industry Security interviews Forensics expert Rob Lee  who says its not new types of attacks that concern him. It’s the old ones that continue to impact organizations. How can organizations learn from past incidents and respond in 2013? The bulk of the cases he investigates are external breaches, not insider cases, says Lee, a seasoned forensics professional and curriculum lead and author for digital forensic and incident response training at the SANS Institute. When analyzing the incidents and reporting back to technical teams or executives, he’s often faced with the question, “How do…

  • Mergers and Acquisitions/Exit Planning - QuickRead Featured

    Mobile Cyber Security War: We are All on the Frontlines

    Lots of Room for Innovation on Security. M&A Pros: Here’s What to Watch! What’s an important sector to keep an eye on in terms of M&A? Mobile Security. Mobile devices face at least four threats: Fraud (stealing $$), data theft, and probing and nuisance attacks. There’s room for innovation on everything from voice encryption, payment card processing, digital rights management, user authentication, application testing, and network monitoring to forensic triage, malware prevention, and more. Brent Lorenz, McLean VP, explains.