|
The staggeringly high number illustrates the high cost of stolen IP. The event prompted an initiative to introduce risk management measures to guard against an incident of this kind happening again. The project, initially conceived as a response to a single incident and type of threat, grew to a review of data security throughout the value chain. This included all geographic and functional divisions, with data from research and development, through engineering to manufacturing, including sourcing and distribution. Complete the form to download this resource in full. |