This document summarizes a webcast on protecting corporate assets from cyber threats. It discusses common cyber threats like IP theft, data breaches, and how threat actors like nation states, malicious insiders, and competitors can exploit vulnerabilities. It then provides a 5-step framework organizations can use to assess trade secrets, identify threats, measure the impact of a loss, improve security practices, and measure effectiveness of improvements. The webcast aims to help organizations understand security risks and guide investments to best protect their most valuable information assets.