Hi [[ session.user.profile.firstName ]]

Intellectual Property

  • Actavis and equivalence – where are we now?
    Actavis and equivalence – where are we now? Douglas Drysdale, partner, HGF Recorded: Oct 11 2018 63 mins
    The UK Supreme Court's 2017 decision in Actavis v Eli Lilly introduced a doctrine of equivalents into UK law. In this webinar, we'll discuss the implications of that decision and look at how it is being applied in other cases in the UK courts.
  • Container Security – What you need to know!
    Container Security – What you need to know! Olli Jarva, Managing Consultant, Synopsys Recorded: Oct 4 2018 45 mins
    Containers are revolutionizing application packaging and distribution. They’re lightweight and easy to build, deploy, and manage. But what about security? Your containers include more than the applications your team builds. They also bundle all the third-party software and open source components those apps depend on. In our webinar “Container Security – What you need to know!”, Olli Jarva, Managing Consultant & Security Architect, outline how you can prevent vulnerable code hiding in your containers from compromising your applications and sensitive data and how you can take control in the event when a new vulnerability breaks out for open source component present in your containers.
  • Tracking technology trends to maximise commercialisation value
    Tracking technology trends to maximise commercialisation value Mireya McKee CEO of McKee Innovation Consulting Recorded: Sep 26 2018 55 mins
    Technology commercialisation at its core requires for an invention to be applied to a use case in a specific market. Doing this successfully will ensure that you are getting ROI out of your research and inventions. Mireya McKee has over 16 years experience in research, academia and commercialisation and will be talking about how she utilises technology trends to maximise commercialisation value.

    Some of the topics discussed in this webinar will be:

    * How to track technology trends
    * What can patents tell us about technology trends
    * Technology adoption cycle
    * How technology readiness levels can affect commercialisation opportunities
  • Don't Acquire Open Source Risks You're Not Aware Of
    Don't Acquire Open Source Risks You're Not Aware Of Daniel Kennedy, Research Director - Information Security, 451 Research; Phil Odence, GM – Black Duck On-Demand Recorded: Sep 19 2018 49 mins
    Modern applications are constructed using open source components. Most organizations understand they’re using open source. What they likely underestimate is its prevalence in their homegrown applications and the potential security and license compliance risks they assume if they’re not continuously monitoring those libraries. When companies merge or are acquired, that unknown risk is transferred, potentially to organizations with greater regulatory exposure. Join Daniel Kennedy, Research Director, Information Security, and Phil Odence, GM, Black Duck On-Demand, for a discussion of these risks and how to address them.
  • Second Medical Use Patent Opportunities from Personalised Healthcare Inventions
    Second Medical Use Patent Opportunities from Personalised Healthcare Inventions Dr. Laurence Gainey, Patent Director, HGF Recorded: Sep 11 2018 58 mins
    Personalised healthcare (sometimes referred to as precision medicine) is an evolving field in medicine where a therapeutic treatment is tailored to an individual with a particular disease. The patenting of personalised healthcare inventions has proved problematic in a number of jurisdictions, most notably the USA. However, various aspects of these inventions are patentable in Europe.

    This webinar will set the scene as to what personalised healthcare is and will run through the history of second medical use patenting in Europe. Discussing key cases such as G5/83, T1020/03 and G2/08.

    It will then focus on how second medical use patenting can be applied to personalised healthcare inventions and will give examples of claim language that is finding favour at the EPO.
  • The Modern SOC: Automated Intelligence Tradecraft and the Human Element
    The Modern SOC: Automated Intelligence Tradecraft and the Human Element IDC Research Director Chris Kissel and LookingGlass Product Manager Brandon Dobrec Recorded: Aug 29 2018 56 mins
    Traditional cybersecurity leads with a “block & tackle” strategy. But as threats become more complex, targeted, and sophisticated, security operations centers (SOC) require a better understanding of how threats beyond the perimeter interact with their network. Join IDC special guest, Research Director Chris Kissel and LookingGlass Product Manager Brandon Dobrec in a discussion on modern-day SOC needs for a threat platform that marries automated intelligence tradecraft with the human element.
  • Security Champions: Only YOU Can Prevent File Forgery
    Security Champions: Only YOU Can Prevent File Forgery Marisa Fagan, Product Security Lead, Synopsys Recorded: Aug 22 2018 57 mins
    If you’re a developer, there will come a time when you realize that you have the power not only to ship awesome features but also to protect them so that no one else can tamper with all your hard work. Every developer is responsible for coding securely, but a brave few among us will take this duty one step further by wearing the mantle of a Security Champion.

    This webinar is your guide to becoming the Security Champion you always wanted to be, in just five easy steps. We’ll also talk about what benefits you’ll get out of it, besides saving the world, and what to do if your company doesn’t have a Security Champions program or even a product security program.
  • AppSec in Financial Services through the BSIMM Lens
    AppSec in Financial Services through the BSIMM Lens Nabil Hannan, Managing Principal, Synopsys Software Integrity Group (SIG) Recorded: Aug 14 2018 39 mins
    Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts you’ve put in place even make sense? The Building Security In Maturity Model, or BSIMM, is a metrics-driven study of existing security initiatives at other organizations. BSIMM results help you assess the current state of your software security initiative and determine which areas need improvement.

    During the webinar, we’ll use a BSIMM broken down by the financial services industry to see what other companies are doing. We’ll also:

    · Use real data to help drive your software security initiative
    · Learn how organizations use the BSIMM to measure the maturity of their software security initiatives
    · Look at the aggregate data of the FSI vertical in the BSIMM
    · Discuss some of the most common activities that we observe with FSI companies and the drivers of those activities
  • Using sponsored research as a pathway to licensing early stage technologies
    Using sponsored research as a pathway to licensing early stage technologies Laura Schoppe, President and Owner of Fuentek Recorded: Aug 14 2018 46 mins
    Patent licensing negotiations have an extremely high fail rate- this can be down to unfavourable licensing terms or weak patent portfolios. One of the ways universities and industry are trying to bridge the gap between innovation and commercialisation is by working together much earlier.

    From a university standpoint, their research can be tailored to specific industry needs, as well as having research costs covered. Through the eyes of industry, they can get their hands on the latest research developments, and attract the brightest and talented individuals to their businesses.

    Laura Schoppe, President and Founder of Fuentek, who has years experience helping TTO's improve their chances of commercalisation will be joining us to discuss:

    - How to start sourcing strategic sponsorship deals
    - Where to begin with searching and conversations for partnerships
    - The benefits of this chosen pathway. i.e Minimising risk

    Please note: All viewers will have their data shared with our guest speaker.
  • DevSecOps: Security at the Speed of DevOps with Comcast
    DevSecOps: Security at the Speed of DevOps with Comcast Larry Maccherone, Sr. Director DevSecOps Transformation, Comcast Recorded: Aug 3 2018 50 mins
    Security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy orders of magnitude faster than human gating can achieve.

    What’s needed to add security to DevOps are tools that work well with rapid-cycle CI/CD pipelines and an approach that reinforces the DevOps culture and process changes. This requires that security specialists become self-service toolsmiths and advisors and stop thinking of themselves as gatekeepers.

    This webinar includes guidance on the characteristics of security tools compatible with DevOps, but it focuses primarily on the harder part: the people. This talk introduces the DevSecOps manifesto and provides you with a process model, based on agile transformation techniques, to accomplish the necessary mindset shift and achieve an effective DevSecOps culture transformation. It has been successfully used in a large DevSecOps transformation at Comcast and has gained recognition in DevSecOps circles as a leading framework.
  • Reviewing Spectre 6 Months Later
    Reviewing Spectre 6 Months Later Taylor Armerding, Senior Security Strategist for Synopsys Recorded: Jul 25 2018 30 mins
    It’s been more than six months since the major design flaw in computer chips labeled Spectre became public. And, as predicted, it is still haunting the world of information technology. The CPU (central processing unit) is, after all, the “brain” of any computer, phone, tablet, modern TV, or other “smart” device.
    Since then, we’ve all learned a bit about terms some of us had never heard before—“speculative execution,” anyone? We’ve also been told that you can’t just patch a chip the way you can patch bugs in software. But you can create work-arounds with software patches.
    In this webinar, Taylor Armerding, senior security strategist for Synopsys Software Integrity Group, will address some of the questions that “regular”—i.e., nontechnical—users may have about Spectre:
    - What is it?
    - How does it work?
    - Why does it work?
    - Why didn’t chip makers catch a flaw of this magnitude during the design phase?
    - Why is a tool called static analysis the best way to work around Spectre without causing intolerable performance slowdowns?
  • How to create a 5-year M&A plan for dealing with patent cliffs
    How to create a 5-year M&A plan for dealing with patent cliffs Jurgen Vollrath, President at Exponential Technology Counsel Recorded: Jul 25 2018 40 mins
    A ‘Patent cliff’ describes a severe drop in revenue once the patent for a company’s leading product expires. The sharp revenue decline is a result of competitors being able to start developing and selling the product, often at a much lower price.

    As US biopharmaceutical company Celgene struggles to get regulatory approval from the FDA, the company is facing major market, shares and revenue losses, and is facing a phenomenal patent cliff. Furthermore, research from EvaluatePharma reports that an estimated $250 billion in projected sales is at risk between 2018-2024 as many drugs lose exclusivity.

    When it comes to acquisitions, the effects of a dwindling patent term can severely impact the value of your company. So how do you create 5-year plan to prepare for an inevitable patent cliff? We are very excited to welcome back Jurgen Vollrath, President of Exponential Technology Counsel, and customer of PatSnap. ET Counsel, advise clients on IP strategy & business alignment to ensure the most successful M&A and exit outcomes.

    In this webinar, Jurgen will be discussing:

    - Risk vs. reality when it comes to patent cliffs
    - How to create a 5-year M&A plan for your organisation
    - How to find potential acquisition targets
    - Predicting the potential impact a patent cliff could have on your business.
  • Best Practices for Managing Open Source in an Organization and Throughout M&A
    Best Practices for Managing Open Source in an Organization and Throughout M&A Mark Radcliffe, Partner, DLA Piper/General Counsel OSI; Anthony Decicco, Shareholder, GTC Law Group & Affiliates Recorded: Jul 18 2018 58 mins
    The use of open source has surpassed the occasional and solidified itself as the standard. In fact, the Black Duck by Synopsys 2018 Open Source Security and Risk Analysis found that 96% of the applications we scanned last year contained open source components.

    It’s increasingly difficult to properly manage open source in an organization to ensure compliance with the over 2,000 different licenses in use today and defend against new vulnerabilities, which surface frequently.

    Join this webinar with top open source legal experts Mark Radcliffe (partner at DLA Piper and general counsel for the Open Source Initiative) and Tony Decicco (shareholder, GTC Law Group & Affiliates) as they discuss best practices for managing open source in an organization and throughout an M&A transaction:

    - How do you conduct an open source / third-party software audit?
    - How do you get the most out of your Black Duck code scan?
    i.e. Handling license compliance issues and managing security vulnerabilities
    - What are key aspects of an effective open source / third-party software policy for both inbound use and outbound contributions?
    - What are key success factors for effectively releasing code as open source?
  • A guide for UK and Chinese patent collaboration
    A guide for UK and Chinese patent collaboration Tom Duke attaché for UK in Beijing UK Intellectual Property Office Recorded: Jul 18 2018 56 mins
    UK Intellectual Property Office is going to be joining this webinar to explore some of the ways UK and Chinese companies can work together on innovation projects, where patents are involved.

    Some of the topics covered will be:

    - Different types of collaboration i.e. university, industry
    - Tips for setting up successful partnerships
    - Chinese Policy on Licensing and Ownership of incremental innovation
  • Trends in Security: How to Create a Scalable Threat-modeling Practice
    Trends in Security: How to Create a Scalable Threat-modeling Practice Chandu Ketkar, Principal Consultant, Synopsys Recorded: Jul 17 2018 45 mins
    For most organizations, performing threat-modeling is a difficult and an expensive undertaking. There are good reasons why this is the case. Threat modeling traditionally requires an experienced security architect with knowhow in architecture patterns, design patterns, a breadth of technologies, and above all deep security knowledge.

    Join this webinar and learn:

    - Consistency/Reliability: Use of patterns allows us to identify recurring problems/patterns and provide consistently the same solution. In security this means that identifying patterns during threat modeling will allow us to create consistent design, development, testing, and risk guidance.

    - Efficiency: Use of patterns allows us to automate some part of a problem while leaving the more complex concerns to be tackled by experts. This creates efficiencies.

    - Commonly understood taxonomy: Patterns create a common taxonomy for organizing knowledge, training users/practitioners, communicating with stakeholders (developers, testers, architects, security analysts, etc.)
  • Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem
    Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem Michael Suby, VP of Research at Frost & Sullivan, and James Carnall, VP of Customer Support Group at LookingGlass Recorded: Jul 17 2018 63 mins
    In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.
  • How can static analysis help DevOps teams maintain velocity securely?
    How can static analysis help DevOps teams maintain velocity securely? Meera Rao, senior principal consultant and director of the secure development practice - Synopsys Software Recorded: Jul 17 2018 46 mins
    Static application security testing (SAST) is the process of examining source code for security defects. SAST is one of many checks in an application security assurance program designed to identify and mitigate security vulnerabilities early in the DevOps process. Integrating SAST tools into DevOps processes is critical to building a sustainable program. And automating these tools is also an important part of adoption, as it drives efficiency, consistency, and early detection.

    If you have questions like these, and you’re concerned about integrating SAST tooling into your DevOps process, this session will offer actionable advice to automate security testing that supports DevOps velocity.

    But DevOps practitioners looking to integrate SAST tools into the DevOps pipeline often have questions:

    How do I manage false positives?
    How do I triage the results?
    What happens to new issues identified?
    How can I use a tool in my DevOps pipeline?
  • *AST in CI/CD - How to Make it Work
    *AST in CI/CD - How to Make it Work Ofer Maor, Director, Solutions Management at Synopsys Recorded: Jul 17 2018 58 mins
    SAST, IAST, DAST, MAST, *AST – There are plenty of technologies and ways to test your software, but how do we do that without slowing us down in a rapid development environment. In this session we will give practical advice on how to integrate software security testing into your CI/CD and your development process so it works. The session will review the pros and cons of each of the testing technologies, how to adapt it to rapid development, and how to make testing work as organizations are moving to A/B testing. Finally, this session will guide on how to manage the balance between risk and speed to build the right process, so that real threats will become blockers, but other issues will be handled in a parallel, slower cycle, without slowing down the main delivery.
  • Getting Your Bearings in a DevSecOps World
    Getting Your Bearings in a DevSecOps World Apoorva Phadke, Associate Principal Consultant, Synopsys Recorded: Jul 12 2018 48 mins
    Development and operations teams have already come a long way by aligning around the shared goal of delivering stable, high-quality software—quickly. By automating manual processes and building tools into the continuous integration and continuous delivery (CI/CD) pipeline, they’ve increased trust between groups, which is essential as these once-disparate teams tackle critical issues together. In this webinar, you’ll learn how to build a DevSecOps culture in your organization with automated and integrated application security tools and the right training for each team.
  • How to accelerate your innovation pipeline using Social Impact Investments
    How to accelerate your innovation pipeline using Social Impact Investments Rosemarie Truman from The Center for Advancing Innovation Recorded: Jul 12 2018 45 mins
    Social Impact Investment brings together capital and experience from the public, private and non-for-profit industries to achieve specific social objectives. The return of these investments is measured typically by the social outcomes achieved.

    The Centre of Advancing Innovation is a public-private partnership non-profit focused on identifying breakthrough inventions hidden in portfolios, to maximise investor returns and commercial success. Research performed by the group has highlighted that Social Impact projects accelerate innovation, and result in higher returns.

    In this webinar, Rosemarie Truman, CEO and Founder of CAI will be discussing the positive implications of choosing social impact projects for your business, including:

    - Why they accelerate innovation
    - How these projects can increase your potential investment opportunities for the future
    - The influence on the future funding of projects.
  • Why Brexit will hurt productivity in Financial Services the most...
    Why Brexit will hurt productivity in Financial Services the most... Mark Elwood - Marketing Director, TeleWare Recorded: Jul 11 2018 45 mins
    ... and the technologies that will prevent it.

    Join this webinar to hear how technology is creating a mobility enabled workforce to increase productivity in financial services and the lessons other sectors can learn.

    In the words of Nobel Laureate Paul Krugman ‘productivity isn't everything, but in the long run it is almost everything.’

    Creating a modern workforce that has access to the technology that will improve productivity is key to ending the productivity crisis. TeleWare, working with Financial Services clients are helping create a mobile enabled workforce designed to improve productivity. These lessons can be adopted in many vertical sectors, particularly in a post GDPR and Brexit world.

    Find out:
    • Why you should be focusing on increasing productivity in your business
    • How enabling your employees to use the latest technology with no cost to your business can improve employee satisfaction and create growth
    • Why mobility is the secret weapon in the fight against stagnant productivity growth
    • Which technologies you should be thinking about to create a mobility enabled workforce

    Target Audience:
    • Finance, Retail, Professional Services, Manufacturing, Construction, Health
    • UK & Ireland
    • SME – Enterprise
    • IT, Operations role profiles

    Join us for this insightful webinar that explores the technologies firms are adopting to help increase productivity and to beat their competition.
  • China IP Trends: the shift in patent filing
    China IP Trends: the shift in patent filing Justin Simpson, RWS, founder of inovia; Xia Zheng, founder, president of AFD China Intellectual Property Recorded: Jun 28 2018 66 mins
    The data trends do not lie: China will soon become the top filer of IP in the world, both home and abroad. What does this mean for your business? Join RWS and Managing IP for our webinar China IP Trends: the shift in patent filing as we take a look at the data and give you tips to stay ahead of your competitors. Guest speakers Justin Simpson, RWS, founder of inovia and Xia Zheng, founder, president of AFD China Intellectual Property, will review trends from WIPO and discuss important strategies for filing in China, including some of the advantages of their system and common mistakes even experienced filers fall victim to.

    •Keys to Success: Understanding the Patent System in China

    •National Filing Numbers in China: Looking at the Data
  • Surgical Threat Mitigation: Sharpen Your Response
    Surgical Threat Mitigation: Sharpen Your Response Paul Roberts, Security Ledger & Brandon Dobrec, LookingGlass Cyber Solutions, & special guest Chris Roberts Recorded: Jun 26 2018 61 mins
    Cyber threat intelligence – when properly gathered, refined, and applied – can help organizations identify business risks and target both protections and mitigations. But what distinguishes high-quality and actionable threat intelligence from low-quality security "noise"? How are cutting edge CISOs and IT security teams applying threat intelligence to respond to incidents and slam shut windows of compromise?

    Find out in this webinar moderated by Paul Roberts, the Editor in Chief at The Security Ledger. Paul will be joined by LookingGlass’ Brandon Dobrec, and counter threat intelligence & vulnerability research expert Chris Roberts. Together they will review the value of threat intelligence to organizations, discuss how cutting edge firms are using threat intelligence to their advantage, and review how to orchestrate threat intelligence to automate mitigation and combat third party risk.

    Tune in on Tuesday, June 26 @ 1PM ET!!
  • Building Your Application Security Toolkit: A Holistic Approach
    Building Your Application Security Toolkit: A Holistic Approach Stephen Giguere, Solution Engineer, Synopsys Recorded: Jun 22 2018 59 mins
    Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
  • Do We Trust Software?
    Do We Trust Software? Chris Clark, Principal Security Engineer – Strategic Initiatives, Synopsys Recorded: Jun 20 2018 46 mins
    Trying to keep pace in a highly connected world and increasingly hostile environment is a challenge for any developer, let alone an entire industry. To protect the software they write, developers turn to technologies and processes such as audits, reverse engineering, application firewalls, sandboxing, and many others to provide a level of protection. But these technologies also have the potential to become entry points for vulnerabilities. So do we really trust software?

    See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on how the cyber supply chain can have a direct and meaningful impact on the overall design and deployment of software. See how known vulnerability management, mitigation, and training can affect the known risk profile of overall software design. Learn about what we are working on and how you can participate in improving standards and programs that reduce cyber risk.