SlideShare a Scribd company logo
CII National Risk
Summit
IPR Risks
Murali Neelakantan
• Identification
• Allocation
• Mitigation
• Insurance
• Provision
Risk Principles
• Dynamically Identify IPR
• Opportunities & Threats
• Own & Competitors
• Watch out for new forms of IPR
Attitude = Culture = SoP
• Failed Ideas & Trials
• Regular FTO & search
• Data Exclusivity
• Patent Linkage
Patent: Wealth from Waste
• Design
• Trade Name
• Trade Dress
• Copyright
Pharma: Beyond Patents
• Local Registrations
• Public Interest
IPR Neglect: Examples
• Harmonisation
• Engaging with Government
• Role of Civil Society
• Precedent & Proof by Analogy
Futureproofing IPR Risk
• FACT, FAST
• Use existing infrastructure
• Focus on IPR:
• Annual Valuation
• Training & Reward
Change, but How?
IPR:
Risk Management
To
Reward Management
M u r a l i N e e l a k a n t a n
m n e e l @ h o t m a i l . c o m
Twi t t e r : @ g r u m p e o l d m a n

More Related Content

Similar to CII National Risk Summit

Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction
Vinil Patel
 
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
David Dourgarian
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
Alan Greggo
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
James Deiotte
 
Identification of idea and approach
Identification of idea and approachIdentification of idea and approach
Identification of idea and approach
Mayank Singh
 
Assessment support p1 p2 p3
Assessment support p1 p2 p3Assessment support p1 p2 p3
Assessment support p1 p2 p3
Graham Clements
 
Protecting Trade Secrets in China
Protecting Trade Secrets in ChinaProtecting Trade Secrets in China
Protecting Trade Secrets in China
Enterprise Security Risk Management
 
Entrepreneurial Mindset
Entrepreneurial MindsetEntrepreneurial Mindset
Entrepreneurial Mindset
MBA ASAP
 
Ethics in Organizations
Ethics in OrganizationsEthics in Organizations
Ethics in Organizations
The Virtual HR Director, LLC
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
murnan
 
What lawyers need to know about startups
What lawyers need to know about startups   What lawyers need to know about startups
What lawyers need to know about startups
LawSikho
 
What lawyers need to know about startups
What lawyers need to know about startups What lawyers need to know about startups
What lawyers need to know about startups
Dr Aniruddha Malpani
 
"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention Considerations"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention Considerations
Skoda Minotti
 
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
connectestonia
 
IPR Protection
IPR ProtectionIPR Protection
IPR Protection
Brett Miller
 
Human Rights Impact Assesments And Corporate Responsibility
Human Rights Impact Assesments And Corporate ResponsibilityHuman Rights Impact Assesments And Corporate Responsibility
Human Rights Impact Assesments And Corporate Responsibility
Aviva Canada
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
Exo Futures
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
Health IT Conference – iHT2
 

Similar to CII National Risk Summit (20)

Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction
 
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
Identification of idea and approach
Identification of idea and approachIdentification of idea and approach
Identification of idea and approach
 
Assessment support p1 p2 p3
Assessment support p1 p2 p3Assessment support p1 p2 p3
Assessment support p1 p2 p3
 
Protecting Trade Secrets in China
Protecting Trade Secrets in ChinaProtecting Trade Secrets in China
Protecting Trade Secrets in China
 
Entrepreneurial Mindset
Entrepreneurial MindsetEntrepreneurial Mindset
Entrepreneurial Mindset
 
Ethics in Organizations
Ethics in OrganizationsEthics in Organizations
Ethics in Organizations
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
 
What lawyers need to know about startups
What lawyers need to know about startups   What lawyers need to know about startups
What lawyers need to know about startups
 
What lawyers need to know about startups
What lawyers need to know about startups What lawyers need to know about startups
What lawyers need to know about startups
 
"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention Considerations"Lucky 13" Fraud Prevention Considerations
"Lucky 13" Fraud Prevention Considerations
 
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
 
IPR Protection
IPR ProtectionIPR Protection
IPR Protection
 
Human Rights Impact Assesments And Corporate Responsibility
Human Rights Impact Assesments And Corporate ResponsibilityHuman Rights Impact Assesments And Corporate Responsibility
Human Rights Impact Assesments And Corporate Responsibility
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
 

CII National Risk Summit