Trade Secrets and Cybersecurity: Protecting Intellectual Property, Mitigating Loss and Navigating Legal Responses

Recording of a 90-minute premium CLE webinar with Q&A

This program is included with the Strafford CLE Pass. Click for more information.
This program is included with the Strafford All-Access Pass. Click for more information.

Conducted on Thursday, September 24, 2015

Recorded event now available

or call 1-800-926-7926
Course Materials

This CLE course will provide guidance to IP counsel on protecting trade secrets from cyberattack. The panel will discuss what action to take if trade secrets are stolen in a cyberattack and to mitigate the loss. The panel will also examine the legal responses available to respond to a cyberattack.


U.S. businesses have seen an alarming growth in cyberattacks on their most sensitive and valuable information and intellectual property. Trade secrets are a key target. Counsel should guide business clients in developing and implementing data security policies and practices to safeguard both the clients' own trade secrets and the trade secrets of their customers and commercial partners, which the company may have either an express or implied obligation to keep safe from attacks. If a business is the victim of a cyberattack, counsel must act promptly to limit the harm to the client and its business relationships, comply with reporting obligations, cooperate with law enforcement, and lay the foundation for a successful claim for insurance coverage.

Listen as our authoritative panel of IP attorneys examines what steps should be taken to protect trade secrets. The panel will also discuss how to mitigate losses if a cyberattack occurs and navigate the legal response a company can and should take.



  1. Steps to take to protect trade secrets
    1. Key vulnerabilities
    2. Identifying and managing risks
  2. Mitigating losses if cyberattack occurs
  3. Navigating the legal response a company can/should take following cyberattack
    1. Civil litigation
    2. Federal criminal investigation
    3. Executive Order/sanctions


The panel will review these and other key issues:

  • What are the key vulnerabilities that make cyberattack and trade secret theft a real risk?
  • What practical legal remedies are available if a company's trade secrets are stolen by cyberattack?
  • What strategies can counsel employ to identify and manage the cyber risks to trade secrets?


Kevin A. Cranman
Kevin A. Cranman
Senior Group Legal Counsel

For over 20 years Mr. Cranman has led technology and IP matters for organizations including the Georgia Institute of...  |  Read More

Margaret (Peggy) Daley
Margaret (Peggy) Daley

Managing Director
Berkeley Research Group

Ms. Daley has over 25 years of experience in investigations, data analytics, dispute resolution, and regulatory...  |  Read More

Halligan, R. Mark
R. Mark Halligan


Mr. Halligan focuses his practice on IP litigation and complex commercial litigation. He has successfully represented...  |  Read More

Matthew F. Prewitt
Matthew F. Prewitt

Schiff Hardin

Mr. Prewitt is Chair of the firm’s Cybersecurity and Data Privacy Team and Co-Chair of the firm’s Trade...  |  Read More

Access Anytime, Anywhere

Strafford will process CLE credit for one person on each recording. All formats include course handouts.

To find out which recorded format will provide the best CLE option, select your state:

CLE On-Demand Video