Part I: Conceptual Principles This is a four-part article series. The articles and discussion focus on the conceptual principles and the practical applications of the cost approach in the development of intellectual property valuations. Part I of this discussion focuses on the conceptual principles that support the application of the cost approach to intellectual property valuation. Part II describes the generally accepted cost approach valuation methods. Part III describes the practical measurement procedures related to intellectual property cost metrics and obsolescence metrics. Part IV presents several illustrative examples of the application of the cost approach in hypothetical intellectual property valuation…
-
-
Predicting Cyber Security Breaches Cyber security breaches often result in the improper transfer of personal identifying information or sensitive financial and health information. This article focuses on the identification of potential cyber security breaches and how courts are addressing the presentation of such cases, including the issue of damages. Read Identifying and Calculating Recoverable Damages in Cyber Security Breaches—Part 1
-
Predicting cyber security breaches Cyber security breaches often result in the improper transfer of personal identifying information or sensitive financial and health information. This article focuses on the identification of potential cyber security breaches and how courts are addressing the presentation of such cases, including the issue of damages.
-
External Attacks, Data Loss are Top Concerns Jeffrey Roman at Government Industry Security interviews Forensics expert Rob Lee who says its not new types of attacks that concern him. It’s the old ones that continue to impact organizations. How can organizations learn from past incidents and respond in 2013? The bulk of the cases he investigates are external breaches, not insider cases, says Lee, a seasoned forensics professional and curriculum lead and author for digital forensic and incident response training at the SANS Institute. When analyzing the incidents and reporting back to technical teams or executives, he’s often faced with the question, “How do…
-
Lots of Room for Innovation on Security. M&A Pros: Here’s What to Watch! What’s an important sector to keep an eye on in terms of M&A? Mobile Security. Mobile devices face at least four threats: Fraud (stealing $$), data theft, and probing and nuisance attacks. There’s room for innovation on everything from voice encryption, payment card processing, digital rights management, user authentication, application testing, and network monitoring to forensic triage, malware prevention, and more. Brent Lorenz, McLean VP, explains.