Hi [[ session.user.profile.firstName ]]

Legal

  • Align your innovation data with your target molecule
    Align your innovation data with your target molecule Chemist and IP expert Andy Lai Recorded: Aug 22 2017 33 mins
    Innovation in chemistry is required in all sectors of industry, whether it be in pharmaceuticals, material science, or indeed any other branch of science. These innovations are the foundation of our modern society and lead the way for businesses to progress - and help the world to progress.
    Chemical by PatSnap seamlessly links chemical structure searches to intellectual property data, enabling you to effortlessly discover chemical structures linked to the most relevant of patents, no matter how they’re described or written.

    In this webinar, we’ll be joined by Chemist and IP expert Andy Lai as he demonstrates how you can validate your target chemicals performance against 114 million structures, from over 100 patent jurisdictions.

    Some other topics that will be discussed include:

    - How to utilize the similar search function to discover structures very close to yours
    - How the Chemscape can highlight opportunities for licensing and collaboration
    - Discover what the good chemical performance indicators look like
  • Como estruturar investigações internas antifraude
    Como estruturar investigações internas antifraude Kroll's Fernanda Barroso, Fernando Carbone, and Ian Cook Recorded: Aug 17 2017 59 mins
    Os dados do último Relatório Global de Fraude & Risco da Kroll demonstram que as empresas brasileiras ainda apresentam deficiências na detecção de fraudes, o que contribui para que boa parte delas passe despercebida.
    Junte-se aos especialistas da Kroll para uma discussão sobre as maneiras mais eficientes de estruturar uma investigação interna, com exemplos reais do trabalho desenvolvido pela principal consultoria global de gestão de riscos corporativos e investigações.
  • Unlocking the Value of Innovation
    Unlocking the Value of Innovation Winston Chan, Director, RHT i-Assets Advisory and Jonathan Ng Creative Partner, Nurun Recorded: Aug 17 2017 60 mins
    Innovation has been the buzzword of the new Asian economy. We are living in an age whereby you are either disrupting the way things are done, or are being disrupted by new business models or technologies. As business leaders in ASEAN, we have to stay ahead of the game in order to survive an environment that is VUCA – Volatile, Uncertain, Complex and Ambiguous. The speakers will provide insights to: -

    - Why disruptive thinking is the key to UNCOVER the latent potential of your business here in ASEAN;
    - How agile creation can UNLOCK massive commercial potential of Intellectual Property Rights (IPRs); and
    - What ways IPRs can help you UNLEASH new value for your business.

    In addition to speaking as Innovators and IP Specialists, the speakers will also be sharing about innovation and IP from their own entrepreneurship experience.
  • Idea to Product: What happens in between?
    Idea to Product: What happens in between? Niosha Kayhani R&D Manager at Cubic | Ruta from PatSnap Recorded: Aug 16 2017 37 mins
    When it comes to innovation, we often only see the end product of a successful idea, and this got us thinking, what about everything in between? What about those ideas that didn't quite make the cut?

    Niosha Kayhani will be discussing how Cubic speeds up their innovation process with a unique workflow. As well as technology before its time and its renewal.
  • 5 things IP and R&D teams should never hide from each other
    5 things IP and R&D teams should never hide from each other Laura Schoppe at Fuentek | Hosted by Ruta Sudmantaite at patsnap.com Recorded: Aug 9 2017 43 mins
    In many organisations, there is a widening gap in the communication between these departments; R&D may invent something with the intention of filing a patent only to find out later from the IP department of pre-existing IP which renders their research (and costs) effectively wasted.

    Here at PatSnap, our clients often tell us that the two teams can no longer work independently, so we thought we'd explore how to improve communication between the two divisions.

    We will be joined by Laura Schoppe an industry expert from the world of R&D and IP, and get her insight into the five most important things the two teams should never hide from each other.

    This webinar is essential viewing for any innovation leader, across any division looking to improve cross team collaboration and flexibility.
  • Practical Tips for a Successful First TAR Project
    Practical Tips for a Successful First TAR Project George Socha, Kelly Atherton, and Sam Merritt Recorded: Aug 8 2017 63 mins
    Technology Assisted Review (TAR) has been judicially approved for use in appropriate cases for several years now and is a powerful tool to maximize efficiency, accuracy, and savings in document review, legal investigations, and beyond. Yet most corporate legal departments and law firms are not utilizing this tool. What is holding them back? In this webinar sponsored by NightOwl Discovery, learn from industry experts about low-risk use cases for your first predictive coding project and practical tips from the trenches on what has (and has not) worked to educate and prepare the legal team to use TAR (or predictive coding), to set up the project and deadlines, and to effectively train the system to most efficiently categorize and rank documents.
  • Technology Assisted Review: What You Need to Know, Ask, and Expect
    Technology Assisted Review: What You Need to Know, Ask, and Expect George Socha, Bonnie Kennedy, Avi Benayoun, Adam Strayer Recorded: Aug 3 2017 63 mins
    Join George Socha, co-creator of the EDRM, as he moderates a conversation with Bonnie Kennedy of Delta Air Lines, Avi Benayoun of Greenberg Traurig and Adam Strayer of BDO. They will discuss the TAR workflow and the importance of open communication between and among the client, the law firm, and the service provider. These three litigation and ediscovery experts will talk about expectations, transparency, and some of the information black holes that can develop during the predictive coding process.
  • Incubators and accelerators: Evolving Start-up models and trends 2017
    Incubators and accelerators: Evolving Start-up models and trends 2017 Britta Wyatt, Managing Consultant at Oxentia Ltd & Ruta from PatSnap Recorded: Aug 3 2017 39 mins
    It’s believed that 9 out of 10 start ups fail every year. With universities being such a big hub of excitement, hard work, experimentation and of course…innovation, a number of universities – and companies – have introduced in-house incubators and accelerators to help ease the pressure many start-ups can feel. As the interest in entrepreneurship has grown in recent years, models for delivering these programmes have evolved to keep pace.

    Britta Wyatt joins PatSnap to discuss current trends in start-up incubation, what the business world can learn from universities.
  • How to Identify, Disrupt and Dismantle Unauthorized Product Distribution
    How to Identify, Disrupt and Dismantle Unauthorized Product Distribution Josh Hopping, Investigative Research Specialist; Annie Wood, Client Service Manager Recorded: Aug 1 2017 50 mins
    As widespread unauthorized product distribution reaches a new level of complexity, brand owners are finding themselves mired in a “whack-a-mole” battle against fraudsters. Unauthorized sellers are adept at setting up new sites and marketplace listings almost as quickly as they are taken down. Meanwhile, their multi-level marketing networks allow them to hide behind layers of anonymity.

    Please join MarkMonitor brand protection experts Josh Hopping and Annie Wood as they discuss how to generate actionable intelligence and leverage investigative tactics to disrupt and dismantle infringing online networks at their source.

    During this webinar, you’ll learn how to:

    -Identify interconnected networks of infringing activity and shut them down
    -Use test purchases and investigations to support legal action
    -Connect the dots between online infringement and physical enforcement
  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin, Julia Romero Peter, Esq., and Karen DeSouza, Esq. Recorded: Jul 26 2017 72 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.

    Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.

    * MCLE Approved in Selected States
  • Trade Secrets: the expert guide to managing them effectively
    Trade Secrets: the expert guide to managing them effectively Donal O'Connell at Chawton Innovation Services & Ruta Sudmantaite at patsnap.com Recorded: Jul 26 2017 60 mins
    By nature, Trade secrets are invisible and well, secret. They can be many things including a design, pattern or formula and allow a business to obtain some information not generally known to the public. which will give them a particular advantage. But with all this information being so secretive, how can you management those assets in a discrete way, that still provides your company with enough protection?

    PatSnap is pleased to welcome back Donal O'Connell, Managing Director of Chawton Innovation Services, for a webinar on trade secret asset management. Some topics covered in this webinar include:

    - The seven 'musts' of trade secrets
    - A look at some recent, high- profile trade secret court cases
    - Trade secret metadata
  • Fighting Brand Impersonation and Noncompliance in Social Media
    Fighting Brand Impersonation and Noncompliance in Social Media Kyle Sale, VP Product Management; Zac Wolf, Product Marketing Manager, MarkMonitor Recorded: Jul 25 2017 54 mins
    With social media consumption at an all-time high, companies must be vigilant against burgeoning cases of brand impersonation, false association and improper partner compliance in the social channel. Customers expect an authentic and seamless brand experience, and even one negative experience can have a damaging impact on your social reputation – and your bottom line.

    Please join MarkMonitor® Brand Protection experts Kyle Sale and Zachary Wolf as they discuss the most common types of brand abuse found in social channels and best practices for protecting your brand across social and other digital channels.

    During this webinar, you'll learn:
    -How to detect unauthorized branding on social pages, user names and posts
    -Existing social site enforcement policies – and gaps you should be aware of
    -What unauthorized use of copyrighted content, images, and trademarks looks like on social media
  • Building Consensus Between Legal, Records and IT on What to Save and Not Save
    Building Consensus Between Legal, Records and IT on What to Save and Not Save Ed Rawson (PNC), Michele Hanrahan (Sound Transit), Shawn Cheadle (LMCO), Mark Diamond (Contoural) Recorded: Jul 20 2017 60 mins
    Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?

    The committee meets again. And again. We’re stuck.

    Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!

    About the speakers:
    Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.

    Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations. 

    Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
  • Cyber Security and Insider Threats: Turning Policies into Procedures
    Cyber Security and Insider Threats: Turning Policies into Procedures Ingrid Fredeen, J.D, VP and Senior Product Manager, NAVEXEngage, and Pamela Passman, President and CEOCREATe Compliance Recorded: Jul 20 2017 64 mins
    Unfortunately, even the best technological defenses won’t protect your company’s intellectual property and data if your employees inadvertently or intentionally take actions to compromise confidential information. The key to mitigating risk for your organization is to provide all employees with policies, processes and training on cyber security awareness.

    Join this presentation with CREATe Compliance where we discuss:
    - Elements of an effective cyber security program – addressing ‘people, process and technology’
    - Spotlight on insiders: Mitigating risks from employees, contractors and third parties
    - Emerging trends: Assessing your enterprise’s cyber security capabilities; training your workforce on cyber security
  • How To Delete a Lot of Emails and Files Quickly and Defensibly
    How To Delete a Lot of Emails and Files Quickly and Defensibly Dan Elam, VP and Consultant, Contoural Recorded: Jul 20 2017 60 mins
    Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?


    About the Speaker:
    Dan Elam is one of the nation’s best known consultants for information governance. As an early industry pioneer, he created the first needs analysis methodology and early cost justification models. Dan’s involvement has been in the design and procurement of some of the largest systems in the world. Today Dan helps Contoural clients develop business cases and establish strategic road maps for information governance. He is the former US Technical Expert to ISO and an AIIM Fellow.
  • Successful Enforcement Strategies in Chinese Marketplaces
    Successful Enforcement Strategies in Chinese Marketplaces Trevor Robbins, Brand Protection Analyst, MarkMonitor Recorded: Jul 20 2017 51 mins
    Online marketplaces in Asia are a fast-growing channel for counterfeit activity and brand abuse. What are the complexities of protecting your brand in these marketplaces and how can you drive a successful enforcement strategy?

    Please join MarkMonitor® Brand Protection expert Trevor Robbins as he reveals key strategies for successful monitoring and enforcement in Chinese Marketplaces.

    During this webinar you’ll learn:

    -How to build a strong trademark portfolio that meets country-specific requirements
    -Ways to leverage local partners to understand and build trust with Chinese marketplaces
    -Tips for avoiding and resolving enforcement issues
  • Lessons from the Trenches: In-House Practitioners Talk Information Governance
    Lessons from the Trenches: In-House Practitioners Talk Information Governance Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Union Bank), Mark Diamond (Contoural) Recorded: Jul 19 2017 60 mins
    Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:

    -How they got their organization to care about Information Governance
    -Lessons learned while executing their Information Governance programs
    -Why it's important to obtain consensus from across different groups
    -Building the right-sized program for your organization

    Join us for a lively discussion!

    About the Speakers:

    Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.

    Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries. 

    Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
  • Success Factors in Threat Intelligence: Part 3 - Key Elements
    Success Factors in Threat Intelligence: Part 3 - Key Elements Allan Thomson, Chief Technical Officer Recorded: Jul 19 2017 49 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    With Part 2, we introduced the overall vision of a successful TI Program. In this webinar, we dig into the key elements of the TI program with concrete examples, and key components of the program that must exist including the right team, process, tools, metrics and connections.
  • Using a Data Placement Strategy to Simplify Data and Document Retention
    Using a Data Placement Strategy to Simplify Data and Document Retention Greg Forest, CTO, Contoural Recorded: Jul 19 2017 56 mins
    Multiple copies of unstructured data live everywhere -- on desktops, laptops, file shares, removable media, cloud shares, SharePoint, etc. But before you can organize, you need to first answer some basic questions:
    - Where is the right place for specific content to live?
    - How and where do we keep as few copies as possible? Who can and should have access to what?
    - How do we make it easy to apply both retention and data security, while still enabling classification.

    Join us for a discussion on real-word data placement strategies for dealing with a complex world.

    About the Speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Why your company is using NDAs all wrong?
    Why your company is using NDAs all wrong? Vick Krishnan | Barrister at Law | Hosted by Ruta Sudmantaite from patsnap.com Recorded: Jul 19 2017 45 mins
    We've got bad news for you. It's extremely likely your company is making serious mistakes in the way it uses NDAs. Join this webinar to find out how to fix that.

    How well protected are your company's ideas, methods, and intellectual property? Non-disclosure agreements, or NDAs, can play an important role, alongside patents, trademarks, trade secrets, and copyright in ensuring that intangible assets are properly secured.

    However, many companies are making significant mistakes in the way that they use NDAs, leaving valuable company assets at risk when discovering and negotiating with external partners, collaborators or suppliers.

    Join our webinar to learn:

    - How to determine when an NDA is appropriate
    - The risk factors you should be aware of
    - Common mistakes companies make with NDAs and how to avoid them

    This webinar is essential viewing for anyone who is involved with collaborative R&D or managing supply chain relationships.
  • Become Litigation Ready: What To Do Now Before Your Next Lawsuit
    Become Litigation Ready: What To Do Now Before Your Next Lawsuit Tom Mighell, VP of Service Delivery, Contoural Recorded: Jul 18 2017 60 mins
    While you may not be able to avoid litigation, there is a tremendous amount you can do now to prepare for if and when litigation does strike. Join us for a thoughtful presentation on litigation readiness covering the policies, processes and technologies organizations can employ to reduce risk and costs of discovery. A little effort now can save a lot of pain and expense later.

    About the speaker:
    Tom is Vice President of Delivery Services at Contoural. With over 25 years of experience in compliance, litigation, privacy and information governance, Tom regularly works with corporations to develop information governance programs, including the creation and validation of records retention schedules.  Tom served as Chair of ABA TECHSHOW 2008, and as 2011-2012 Chair of the ABA's Law Practice Division.
  • The Difference Between Information Governance and Data Governance
    The Difference Between Information Governance and Data Governance Greg Forest, CTO, Contoural Recorded: Jul 18 2017 55 mins
    Legal is about to start an information governance initiative. IT gets wind of it and says that this initiative would be redundant, as they have been working on a data governance project for the past six months. The data governance charter touches on some areas of information governance, but then again not really. Should there be two initiatives, or increase the scope of one of them? Join us for a lively discussion on the difference between Information Governance and Data Governance.

    About the speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Creating the Foundation for an Effective and Workable IG Program
    Creating the Foundation for an Effective and Workable IG Program Mark Diamond (Contoural), Matthew Bernstein (DeutscheBank), Megan Hertzler (PG&E), Andrea Meyer (FCCC) Recorded: Jul 18 2017 60 mins
    Information Governance programs that address records management, privacy, litigation readiness and productivity hold the promise of delivering substantial value to the organization. Yet effectively executing these initiatives is both an art and a science. Join Matthew Bernstein from Deutsche Bank, Megan Hertzler from PG&E, and Andrea Meyer from the Foundation of CA Community Colleges for a lively discussion!

    About the Speakers:
    Matthew Bernstein: Matthew is the head of Deutsche Bank’s Group Information & Records Management, which is responsible for the Bank’s eDiscovery, Records Management, and Archiving operations and strategies. Matthew joined the Chief Operating Office division in 2013 to lead efforts to improve the Bank’s ability to provide timely, complete, and accurate responses to requests for information, while retaining and disposing of records in compliance with legal, regulatory, and business requirements.

    Megan Hertzler: Megan is the Director, Enterprise Information Governance for PG&E, one of the largest natural gas and electric utilities in the United States.  Megan leads the Enterprise Records and Information Management team, which is responsible for the effective management of PG&E records and information assets.  Previously, Megan was the Director of Information Governance at Xcel Energy, an attorney in private practice, and an Assistant Attorney General providing legal counsel to the Minnesota Public Utilities Commission. 

    Andrea Meyer: As the General Counsel and Corporate Secretary at the Foundation, Andrea Meyer oversees the contracts and legal team, facilitates contract management and legal review, manages outside legal counsel relationships, works collaboratively with the Chancellor’s Office legal affairs department to address mutual issues, and provides effective guidance on organizational strategies, programs, services, and their implementation as it relates to general risk management, compliance, and legal liability.
  • The Principles of PatSnap
    The Principles of PatSnap Jarrod Britton, Head of Product Support at PatSnap Recorded: Jul 12 2017 49 mins
    In the last couple of months, PatSnap has launched a number of different feature updates, and we'd like to share how you can drive the most value from them in your day to day work. We'd also like to share some upcoming features to look out for in the coming weeks.

    This webinar will focus on understanding and applying intellectual property knowledge, to the PatSnap platform. Specific topics covered in this session will include:

    - A quick summary of PatSnap's recent growth
    - How to perform the perfect search with examples of common queries
    - Best practices for refining your search results
    - PatSnap Workspaces
    - How to drive value from our analytical insights reports
    - A look into Q3 and some special features to look out for.

    This session will be valuable for anyone looking to explore PatSnap in a little more detail, and is for both PatSnap customers, and those who have never heard of PatSnap before.
  • A Faster, More Advanced VEC App is Coming Soon
    A Faster, More Advanced VEC App is Coming Soon Paul Schiffer, VP of Product, EDR Recorded: Jul 6 2017 46 mins
    The industry's only application to screen for vapor encroachment risk will soon be new and improved. We're moving the VEC App to Lightbox, saving you time. These updates will also include major improvements to key VEC App features like the ground water flow tool, filtering, report output and more. Join us for a preview of the new VEC App.
  • Why the stage-gate process is killing your innovation strategy?
    Why the stage-gate process is killing your innovation strategy? Presented by Robert Weidner MD of DMInc | Hosted by Ruta at patsnap.com Aug 23 2017 3:00 pm UTC 60 mins
    The stage-gate process is as ubiquitous in R&D as doors are in the real-world. But, like doors, stage-gate processes aren't always the best solution for filling a gap. They can be overly elaborate (leading to slowness), fixated on pruning rather optimising (leading to negativity), and lacking in flexibility (leading to missed opportunities).

    Join our webinar as we explore:

    - The shortcomings of the stage-gate process
    - Potential alternatives that could drive more efficiency and productivity

    This webinar is essential viewing for any innovation leaders who are looking to take their innovation strategy out of its comfort zone and to the next level.
  • Success Factors in Threat Intelligence: Part 4 - Connecting the Dots
    Success Factors in Threat Intelligence: Part 4 - Connecting the Dots Allan Thomson, Chief Technical Officer Aug 24 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In this final part of the CSO Series, we will describe how successful TI Programs can fully deliver on reducing risk in organizations. What does success look like for an effective TI Program when it is fully integrated into organizations security framework.
  • Innovation Strategy: How to hire the best R&D Talent
    Innovation Strategy: How to hire the best R&D Talent Cliff Emmons Founder of Accelerated Healthcare Innovations | Hosted by Ruta at PatSnap Aug 30 2017 3:00 pm UTC 60 mins
    R&D success is dependent on many factors – the idea, the market opportunity, the technology readiness, and your company’s ability to deliver on the strategy.

    And at the heart of all these things is the R&D team. Different skill-sets and personalities are better suited to different types of innovation, and world-class innovation teams can find ways to make even the most challenging projects succeed.


    Join Cliff Emmons Former VP of R&D at Medronics and Founder of Accelerated Healthcare Innovations, LLC to learn:

    - The role that team structure plays in R&D success
    - How R&D leaders can build teams to fit their innovation strategy
    - What strategies the world’s most innovative companies use to build R&D A-teams
  • On Premise or Off Premise? A Look at Security Approaches to eDiscovery
    On Premise or Off Premise? A Look at Security Approaches to eDiscovery Doug Austin and Tom O'Connor Aug 30 2017 5:00 pm UTC 75 mins
    Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:

    + Drivers for eDiscovery Technology Solution Decisions Today
    + eDiscovery Industry Market Trends and Their Relation to General Industry Trends
    + What Law Firms are Saying about the Technology
    + What Industry Analysts are Saying about the Technology
    + The Cloud vs. No Cloud Debate
    + Why Not All Cloud Solutions Are the Same
    + A Comparative Approach to eDiscovery Technology
    + Putting a Face on Solutions and Risks
    + Key Components of an eDiscovery Technology Solution

    Panel Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.

    * MCLE Approved in Selected States
  • IP Innovation & Growth: An Australian Perspective
    IP Innovation & Growth: An Australian Perspective Director General of IP Australia, Patricia Kelly & Ruta Sudmantaite from patsnap.com Aug 31 2017 7:00 am UTC 60 mins
    In 2015, the Australian Government commissioned a 12 month public inquiry into Australia’s intellectual property system. The subsequent report in 2016 outlined a number of recommendations, which, if implemented, may require amendments to existing legislation. In this exclusive webinar, Director General of IP Australia, Patricia Kelly, will explore the Australia Government’s response to the report, and its implications for the future of intellectual property in Australia.

    Patricia will also share insights on:
    • IP Australia’s role in shaping the effectiveness of this reform
    • How this will impacted Australia’s IP and Innovation landscape
    • How IP Australia supports Aussie innovation
  • In-house vs. Out-sourced Legal Counsel
    In-house vs. Out-sourced Legal Counsel Svend Littauer | Founder of Entreprenör | Hosted by Ruta at patsnap.com Sep 6 2017 3:00 pm UTC 60 mins
    Many companies believe that outsourcing and in-house legal counsel is an either or option, but as many find out later that's definitely not the case. There are specific strengths and weakness to each option whether it comes to knowledge, cost, motive or efficiency.

    Svend Littauer, Founder of Entreprenör, has spent most of his professional career helping companies set up in the UK and advising them on Legal, HR and Tax topics.

    This webinar will explore:

    - Value of In-house and its limitations
    - Pros and Cons of Outsourcing
    - What to look for when hiring in-house?
    - How to find a law firm that's right for your company?
  • ASEAN connections: Cross-border M&A
    ASEAN connections: Cross-border M&A Richard Dailly, Managing Director and Head of Southeast Asia, Kroll Sep 12 2017 6:00 am UTC 90 mins
    Rich with investment opportunities and positive demographics — a young and dynamic population with growing disposable income and upward mobility — the Association of Southeast Asian Nations (ASEAN) continues to attract international acquirers.

    In 2016, the region recorded 534 M&A transactions valued at US$57.9bn, and Q1 2017 sustained the momentum with 118 deals worth US$14.7bn. This was a year-on-year increase of 8% in value and 7% in volume over the same period in 2016. For foreign inbound M&A, the ASEAN saw 223 deals worth US$23.7bn in 2016, a 10% rise in volume but a 16% drop in value from US$28.1bn (202 deals) in 2015. In 2017, volumes have remained relatively steady while values have shot up, with the first quarter registering as much as 45% of 2016’s annual total.

    Join Kroll's Managing Director and Head of Southeast Asia Richard Dailly as he shares insights on the ways to spot and mitigate risks before entering into cross-border M&A transactions in the ASEAN.
  • Innovation Incentives from around the World
    Innovation Incentives from around the World Thomas Hayden and Antoine Abbatucci | F. Initiatives | Ruta from PatSnap Sep 13 2017 3:00 pm UTC 60 mins
    Many companies are unaware of the different innovation incentives around the world. Some will go as far as applying for foreign patent protection but never looking into the Tax relief or grants that are available to them.

    In this webinar experts from one of the world’s largest specialist R&D Tax consultancies, F. Initiatives; Thomas Hayden and Antoine Abbatucci will be exploring the different funding options available for innovators across Europe, the US and Asia.
  • Lessons for R&D from recent Global Cyber Attacks
    Lessons for R&D from recent Global Cyber Attacks Jeff Middleton | CEO of Lantium | Presented by Jessie Parker at patsnap.com Oct 4 2017 9:00 am UTC 60 mins
    The recent global hacks on companies and organisations including Merck, Mondolez International, Rosneft and the NHS have demonstrated that all different types of industries are at risk when it comes to cyber attacks/hacks.
    Most people think about the obvious affects such as consumer data infringement or loss of functionality but what can an attack mean for your R&D department?

    Jeff Middleton, CEO of Lantium, who build bespoke cyber security solutions, will take us through the learning's of recent "Petya" and "WannaCry" attacks, as well as how we can prevent and minimise losses in such instances.

    Topics covered in this webinar:

    - Recent Global Attacks and learning
    - How Cyber attacks affect R&D, M&A and IP
    - What to consider when creating a cyber-safety strategy.

    Essential viewing for anyone that runs a company where data could be at risk.
  • How to engage senior management in patent strategy and corporate value creation
    How to engage senior management in patent strategy and corporate value creation Anthony Trippe, Managing Director at Patinformatics & Ruta Sudmantaite from patsnap.com Oct 11 2017 3:00 pm UTC 60 mins
    In many companies the patent department is seen as a cost center, managed by attorneys, and seen as a necessary evil by corporate executives. In truly innovative companies the patent function is seen as a profit center, and is imperative for the delivering maximum shareholder value for the organization. These companies use patent analytics to understand the technology environment they operate in, and make certain that they are taking maximum advantage of the investment they make in research and development and the patenting process.

    These organizations also have highly engaged corporate executives that are actively involved in the development of the company’s patent portfolio. Patent professionals in these organizations use the principles of diversification, and risk management, concepts that are well understood by senior management to bring these critical participants into the development of the company’s patent strategy.

    We will be joined by Anthony Trippe, Managing Director at Patinformatics, who was also recently named as one of the Top 300 IP Strategists by IAM Magazine. He will be sharing examples of how patent analytics can be used to understand technology environments, and competitors will be combined with a discussion on risk and diversification as a framework for building patent portfolios that enable corporate objectives and financial goals.
  • How to identify the most valuable patents in your portfolio
    How to identify the most valuable patents in your portfolio Dr. Dierk-Oliver Kiehne | InTraCoM GmbH and Ruta Sudmantaite from patsnap.com Oct 17 2017 3:00 pm UTC 60 mins
    Intellectual property can account for 70% of a company’s value, but how can you be sure that you’re protecting the right patents. Being able to sift through your IP and pick out the gems amongst it can be a challenge, however, with the right strategic mindset, it can be done.

    PatSnap is very excited to welcome back Dr Dierk Oliver Kiehne CEO of leading patent valuation consultancy, InTraCoM GmbH. He’ll be sharing best practises and success stories of others being able to draw out their most valuable assets, and learning when it’s time to let go. This webinar is essential viewing for any innovation leaders who want to get the most value from their intellectual property, and make sure only the best of the best has a place in their portfolio.