The Importance of Cybersecurity for Trade Secret Protection
Developments in trade secrets cases and the growing role of the NIST Framework The whitepaper provides an overview of the current cyber threat landscape to trade secrets and confidential information, and presents the legal relevance of cybersecurity for trade secret protection. Under U.S. and international law, the legal protections afforded to a company’s trade secrets...
Center for Global Enterprise (CGE) Digital Supply Chains: A Frontside Flip
"Digital Supply Chains: A Frontside Flip” presents evidence from 24 top executives running the world’s largest supply chains. The white paper unveils a new approach to enterprise supply chain management – focus on the customer and maximize demand. As a result, improved enterprise Digital Supply Chains (DSC) can lead to a 20% reduction of procurement...
Top 10 Takeaways of the New ISO 37001 Anti-Bribery Management Systems Standard
This eBook provides an overview of the ISO 37001 Anti-Bribery Management Systems standard. The eBook provides key takeaways of the Standard based on insights from CREATe’s Leslie Benton, a member of the U.S. Technical Advisory Group to the ISO committee developing ISO 37001. The eBook explores elements of ISO 37001, distinguishing characteristics, scope of the Standard, and certification.
Cyber Risk: Navigating the Rising Tide of Cybersecurity Regulation
The whitepaper provides an overview of the ongoing wave of legislation, government regulation, procurement requirements, and court-imposed developments across the globe, following the pervasive increase in hacking and cybersecurity incidents. The whitepaper also explores new voluntary approaches and best practices collaboratively developed by governments and the private sector, designed to achieve stronger cybersecurity protections and...
Safeguarding Trade Secrets and Mitigating Threats
An eBook to help companies understand how to protect trade secrets and critical business information from cyberattacks, insiders and other threats. Download this eBook to gain access to: • A five-step framework to help companies assess and safeguard trade secrets. • Guidance about the elements of an effective program to protect critical business information. •...