I am an intangible asset strategist, risk specialist, trainer, and researcher. I am among a niche of national practitioners whose (client) services, blog, publications, and research are produced, almost exclusively, through an intangible asset lens.
Clients whom I serve, seminar attendees to whom I speak, colleagues whom I collaborate, and practitioners I have lead describe me, my work, and engagement demeanor as respectful, ethical, collaborative, and focused which manifest as strong professional commitments to guide clients, companies, and businesses to…
- – identify, unravel, develop, assess, and exploit IA’s value, competitive advantages, and sources of revenue.
- identify and mitigate risks to and safeguard key IA’s in play for business transactions, R&D, new product entry, and other initiatives undertaken to compete in today’s always on…go fast, go hard, go global operating environments.
- sustain control, use, ownership, and monitor value and materiality of IA’s, throughout each assets’ life-value-functionality cycle.
My professional experiences include periods of service in the U.S. Army, federal and state corrections, culminating in a 20+ year career in academia, primarily at Southern Illinois University from which I acquired domestic and international credentials and experiences, a strong work-research regimen, business engagement prowess, and communication skills. I hold BA and MPA degrees from Indiana University along with hours toward a doctoral degree in political science earned from Southern Illinois University.
Throughout my service in academia, I was engaged in aggressive paths of research, publishing, teaching, conducting national presentations, and consulting, variously related to the field of ‘security studies’ with special focus on corporate and university R&D, economic espionage, safeguarding IA’s, and leveraging intangible outcomes stemming from the deployment of security systems.
I have conducted 70+ presentations, seminars, and advisories (nationally, internationally) for companies, professional associations, government agencies, and private (business-security) groups wherein my discreet demeanor and counsel has provided entrée for developing diverse professional ties and acquiring operational level insights to circumstances in which ethics, trust, and respect are requisite attributes.
Collectively, these experiences led Mike to engage in ‘ferreting out and unraveling’ suspected incidents of (corporate, university) theft and/or infringement of proprietary information for which specific protocols were developed. These protocols have various facets and produce important business insights, among them being, unraveling the origins and status of IA’s in play, i.e., their contributory role and value, stability, fragility, defensibility, sustainability, competitive advantage, and influence on reputation.
I receive professional satisfaction from working with IA intensive – dependent go fast, go hard, go global businesses and their management teams, irrespective of sector, size, or revenue. Satisfaction emerges largely from the receptivity and speed which entrepreneurially focused management teams, boards, c-suites, investors, and shareholder’s attention is drawn to the IA-side of their business.
Mike’s respectful and collaborative demeanor exhibited through his skill sets, services, products, and favorable engagement outcomes are grounded in bringing operational clarity to…
- how, when, and under what circumstances IA’s develop, mature, and ultimately embed in business processes and products, primarily in the form of intellectual, structural, and relationship capital.
- converting the contributory role and value of IA’s to sources of revenue, competitive advantage, reputation, and brand.
Ownership of these horizonal skill sets stem from my 20+ year commitment to all things intangible, and recognizing the various ways IA’s are routinely in play in business operations, processes, transactions, and R&D. Preludes to achieving these skill sets and successful client engagements lie in…
- remaining inquisitively current as exhibited in 750+ blog posts, papers, and books I have written on a range of intangible asset matters.
- effectively communicating – articulating IA issues in an informative, learned, and respectful manner.
Attached to this site are numerous excerpts of recorded (video) interviews extracted from media appearances or journalistic initiatives
Research projects independently undertaken (examples)…
- State-corporate sponsored economic espionage – competitive business intelligence operations directed toward corporate – university research collaborations.
- Public Radio large market stations with resources for internal news reporting and programming to recognize, assess, and exploit their contributory IA’s in value, competitive, market-audience expansion, and fund raising contexts.
- Insider Theft Project coordinator, conducted in conjunction with DoD’s Personnel Security Research Center, Monterrey, CA and ASIS International’s Information Asset Protection Council which I chaired.
- Uniform Franchise Operating Contracts, to compare-contrast content regarding distinctions and practices related to (designated) proprietary information and trade secrets.
- Competitive-business intelligence operation methodologies and speed of interaction with designated (early stage company – RBSU) target.
- Pre-post (transaction) due diligence…develop methodologies for determining-measuring-monitoring IA’s contributory value.
- Islamic (Sharia) law interpretations – application of western forms of intellectual property, i.e., hold, develop, buy, sell, etc.
- ‘Stolen Valor’ (false claims of military awards) and ‘It’s Time We Ask’ project.
- Pre-post (business) transaction due diligence.
- Organizational resilience and risk tolerance to companies IA’s.
- Technology transfers’ IA’s (university-based research).
- Venture capital – investor forums; preparing RBSU’s for Q&A.
- Corporate-university research liaison, sustaining-monitoring streams of IA’s.
Principle research investigator to…
The fifth ‘Trends In Proprietary Information Loss’ Survey…for U.S. headquartered companies and organizations. I and three colleagues designed and wrote areas of inquiry for this national survey sponsored by the American Society for Industrial Security International Foundation and the Office of the National Counterintelligence Executive (U.S. intelligence community).
The Trends Survey findings and implications…
- provide substantive insight for strategic responses to the globally asymmetric risks to proprietary IA’s (and IP) relative to current and horizontal risks, threats, methods.
- were incorporated into ONCIX’ ‘Annual Report to the President on Economic Espionage’ and routinely sited – referenced by the executive and legislative branches respectively, national media, and leadership of U.S. headquartered companies.
Client briefing papers…
I have independently researched and written numerous ‘briefing papers’ on a range of IA issues-topics (see examples below distinguished by subject matter and title). Some, briefing papers have been produced at the behest of a company-client as-a-means to bring (operational) clarity, context, and insight to a specific issue, risk, or merely as an introduction to a IA-related challenge being experienced.
Too, in numerous instances, my briefing papers are purposed to serve as a practical means to advance, resolve, or mitigate certain issues and/or challenges, e.g.,
- Enterprise Risk Management
- Building a ‘Corporate Culture’ For Safeguarding IA’s
- Stewardship, Oversight, and Management of Lucrative, Proprietary, Competitive Advantages IA’s: What Decision Makers Are Obliged To Know, Now.
- Organizational Resilience Planning For Company’s IA’s: An Often Overlooked Necessity (Retrieving IA’s Following Catastrophic Business Events To Achieve A Speedy and More Complete Economic Recovery)
- Assessing IA Attractivity, Demand, and Targeting From Sophisticated Global Business Intelligence Operations, Infringers, Counterfeiters, and Country Specific Entities Engaged In Economic Espionage
- Insiders: Factors That Contribute To Theft-Infringement of Proprietary IA’s and IP
- Unraveling and Assessing Safeguards for R&D Projects To Reduce Vulnerability-Probability To Time Consuming and Costly Disputes, Challenges, and Entanglements – Proactively Identifying IA Stability, Fragility, Defensibility, and IA Value Dilution
- International R&D Collaborations: Challenges, Considerations, and Prudence
- Ways to Avoid Proprietary IA ‘Genies’ Getting Escaping Their R&D Bottle Prematurely
- Market Entry Planning, Monitoring, and Due Diligence for IA’s
- Safeguarding IA’s and Proprietary Competitive Advantages To Beat The Odds Against Theft, Infringement, and Compromise
- Mitigate Vulnerability, Probability and Criticality of IA’s To Gray Market Activities
- Knowing Nuances, Requirements, and Risks to Country Centric IP Law Before Collaboration Commences or Transactions Are Executed
- IA Due Diligence Pre-Post Transaction
- When 80% Of A Investment’s Value Lie In IA’s, Conventional, Generic, One Size Fits All – Snap-Shot-In-Time Checklists Seldom Convey Transaction Realities and Risks
- Impairments, Entanglements, Compromises, and Fragility of Valuable IA’s Being Targeted Are Frequently Precursors to Potentially Profitable Transactions Going Bad
- Prudent Covenants to Mergers-Acquisitions: Monitoring The Status, Stability, Fragility, Value, and Sustainability Of Targeted IA’s (pre-post transaction)
- Indicators – Precursors That IA’s Have Become Impaired, Ensnared, Infringed, or Compromised
- Protocols for Contesting and/or Countering Claims of Trade Secret Misappropriation and Value
- Conventional IP Are No Longer Stand Alone Deterrents
- Categories and Origins of Foreign-Domestic Business-Competitive Intelligence and Economic Espionage
- Investing in R&D, Early Stage, Research-Based
- What’s Your IP Position’? Going Beyond The Obligatory, To Mitigate Investor Risk
- VC-Investor Exit Strategies Should Include Resilience Plans For Both The IA’s and Proprietary Competitive Advantages In Play
- Preparing Early Stage Firms To Pitch Prospective Investors and VC’s
- University – Corporate Research Partnerships: Negotiated, Responsive, and Ensuring IA Safeguards Beyond Conventional IP Enforcements
- Academic Freedom and Open Scientific Communication: Re-Framing Time Honored Hallmarks To Meet Global Challenges Posed By Data Mining and Sophisticated Competitor/Business Intelligence Collection and Economic Espionage. (Advancing The Debate Beyond Its 16th Century Origins)
- Interest-Based Bargaining: A Realistic Tool Methodology For TTO’s and Researchers To Engage Opportunities For Tech Transfer – Licensing
- Avoid Treating IA’s As Renewable Resources
Published papers (examples)…
- Safeguarding Proprietary Information: The Worldwide Competitor and Economic Intelligence Phenomenon (Published in Cyber Strategies: Vol. 2, No.2, Summer, 2000)
- IP Due Diligence for Venture Capital and Angel Investors: Don’t Buy Unnecessary Risk! (Triangle Tech Journal, January, 2005)
- Off-Shoring Intellectual Capital: Is History Repeating Itself? Are There Lessons To Be Learned From Y2k? (Memphis Business Journal, February, 2004).
- It’s The Information Stupid! (Protection of Assets, August – September, 2001).
- Moberly, M. D., & Cheon, J. (2009). Use intangible assets to weather the financial crisis. Intellectual Asset Management Magazine, 33. 14-18.
- Moberly, M. D., & Cheon, J. (2011). Enterprise Security. Intellectual Asset Management Magazine, 45, 66-72.
- Moberly, Michael D. (2013) Intangible Assets: Safeguarding What Really Matters to Companies. Intellectual Asset Management (UK)
- Moberly, Michael D. (2010) Enterprise Security. Intellectual Asset Management (UK)
- ‘Safeguarding Intangible Assets’ Elsevier, July, 2014.
- This book which represents the initial treatise on businesses’ expanding fiduciary responsibilities to ‘sustain control, use, ownership, and monitor the contributory value, materiality, and risk’ to their intangible assets.
- ‘On-Boarding for University Technology Transfer’ (a principal contributor) published in series by BVR (Business Valuation Resources) Portland, OR
- I lead – collaborated with a team of experts in researching and writing a comprehensive paper that serves as an ‘on-boarding’ primer (book) targeting university-based research communities engaged in technology transfer.
- I am currently in latter stage of completing a new book which focuses on business-company-institution operational obligations and demonstrated strategies to identify, develop, monetize, commercialize, and safeguard their IA’s for positive returns and competitive advantages and their conversion to value, competitive advantage, sources of revenue.
Presentations, seminars, webinars, briefings and media appearances (examples)…
As noted previously, I have been fortunate to conduct 70+ regional, national, and international presentations, webinars, seminars, keynotes, and invited small group discussions on various matters-issues related to unraveling the origins, assessing the status of IA’s and safeguarding – sustaining (monitoring) assets’ control, use, ownership, value, materiality, and competitive advantages.
- National Public Radio – Morning Marketplace Program – Recommended to show producer by colleagues to discuss ‘rise of trade secret theft in the U.S.’
- European Information Asset Protection Conference – London, UK – Invited keynote speaker. Topic: Safeguarding Proprietary Corporate Information
- CNBC Investing – MSN Money. Recommended to show producer by colleagues to engage in live interview regarding a trade secret theft case.
- CNN’s evening news program. Topic: Economic espionage.
- Society of Certified Public Accountants, Memphis, TN – Topic: Invited to speak Valuing IA’s
- Shanghai, China – Entering New Markets and Safeguarding Proprietary IA’s. (U.S., U.K., and Chinese owned firms. (This occurred in a series of independent meetings-presentations with managing directors of relevant firms.)
- Naval Post Graduate School, National Security Affairs Department, Monterey, CA Topic: Invited to discuss my research regarding economic espionage product-company targeting by adversaries with department chair.
- Oxford University – Invited podcast speaker to EU Intangible Asset Organization. Topic: Safeguarding Intangible Assets.
- Foreign Military Studies Office, Ft. Leavenworth, KS – Topic: Economic espionage.
- National Academy of Sciences, Government-University-Industry Research Roundtable (Washington, D.C.) Topic: Invited to speak about safeguards in university-corporate research alliances.
- Headquarters, Federal Bureau of Investigation, Washington. D.C., Invited by SAIC National Security Division, to discuss my independent research wherein I categorized foreign adversaries targeting university research.
- George Washington University Graduate School, Washington, DC (three-time invited classroom guest lecturer for ‘Economic Espionage’ course.
- National Classification Management Society, Huntsville, AL – Topic: Invited to make presentation regarding foreign adversaries targeting government – private sector R&D.
- HQ’s, Army Research Laboratory, Adelphi, MD – Topic: Invited to speak to ARL officials regarding research on categorizing foreign (economic espionage) adversaries.
- Center for the Study of American Business (Washington University at St. Louis) Topic: Effective use of corporate security (meetings with faculty – former CEO’s.)
- University of Illinois-Chicago, Office of International Criminal Justice. Invited to speak, by program chair to a multi-nation audience of government – private sector security officials. Topic: Realities of Operationalizing Business IP Safeguards
- Chicago Bar Association, Intellectual Property Section, Topic: Invited by Section Chair to conduct first ever presentation about Safeguarding IA’s to SRO audience.
- American Society of Quality, Memphis, TN – Topic: Invited by Chapter Chair to make presentation about ‘Identifying, distinguishing, and assessing contributory value of IA’s to company operations’.
- OPSEC Professionals Society Annual Seminar – two-time invited speaker (one a keynote) by OPSEC Executive Director to speak about converting principles of ‘operations security’ for application to private sector entities to safeguard their proprietary IA’s’. Clearwater, FL and Colorado Springs, CO (Peterson, AFB) where my presentation immediately followed remarks by the incoming Chairman, Joint Chiefs of Staff.
- FBI InfraGard – Nashville, TN and Memphis, TN Chapters – Invited to speak about current research on safeguarding private sector IA’s and foreign adversaries
- Academy of Criminal Justice Sciences, Orlando, FL Invited to speak to academic audience regarding my on-going independent research finding regarding Safeguarding University Research and mitigating risks of pre-mature disclosure, compromise, and/or theft.
- Headquarters, U.S. Department of State, Director and Deputy Director, Overseas Security Advisory Council. Washington. DC: Invited to discuss my research on ‘Distinguishing and Assessing Economic Espionage Adversaries Preying on the Private Sector’.
- Deloitte & Touche, Managing Director, IP Management Group, Chicago, IL – Invited by Managing Director (and his team) to discuss my research on economic espionage affects to U.S. private sector.
- In addition to the above, Mr. Moberly has been invited to make numerous other presentations to agriculture, chemical engineering, accounting, business, and economic faculty researchers, scientists, and research administrators at multiple universities, and private ‘think tanks’.
- Also, I have been invited to engage in – conduct numerous one-on-one briefings-discussions with various echelons of corporations and federal agencies regarding my independently conducted research, its findings-revelations and relevance to private and public sectors.
Professional association service – contributions…
Respectfully, my colleagues frequently describe me as a ‘thought leader’ insofar as, among other things, developing professional (trust) relationships with national and international firms, their executives, and security practitioners internationally, which in several instances lead to being nominated to hold-serve various appointments to professional association (volunteer) leadership.
- Intangible Asset Finance Society
- Chair, Program Development and Global Outreach – my responsibilities included elevating global awareness for Society initiatives.
- Secured global subject matter experts to headline monthly, moderated, 60 minute telephonic – interactive seminars with Society membership.
- These monthly seminars contributed to the Society’s website going from 100+ monthly visitors to consistently 100k+ unique monthly visitors which translated as measurable global awareness, interest, and participation in Society initiatives.
- American Society for Industrial Security International (Service to a professional Association)
- Chair, Information Asset Protection Council
- Convergence Task Force – Advisor-Member (invited)
- Security Education Symposia (Invited participant and group facilitator for six consecutive years.)
- Chair, Academic Programs Council
- Seminar program co-chair, ‘Y2k Security Seminar’ (Washington, DC)
- Information Security Task Force (Body of Knowledge) invited member. ASIS International
- Seminar (2-day) program chair – ‘Information Asset Protection’ (Denver, CO)
- Voted by colleagues and superiors as ASIS Internationals’ Council Chairperson of the year for 2013.
- My submission proposals were selected 7+ times for ASIS-International’s Annual Seminar & Exhibits (world’s largest security products-education venue).
- Chair of ASIS Internationals’ Information Asset Protection Council
During my tenure as Council Chair, I and colleagues lead a successful effort to re-focus our collective expertise and re-articulated our global educational mission to:
- institute monthly (60 minute) ‘global guest and subject matter expert conference call training’ for Council members and 150+ ‘friends/colleagues of the Council’
- reflect the materialization of risks-threats not solely as severe IT breaches, rather as systemic events with probable adverse effects to organization’s portfolio of IA’s.
- reflect the economic fact that 80+% of most company’s value, sources of revenue, and wealth creation lie in IA’s which include intellectual properties
- re-frame the conventional (scope limiting) terminology conveyed by information security to the broader and more relevant information asset protection identifier.
- recognize the value of information (intangible) assets can fluctuate, therefore flexible-maneuverable safeguards should be applied to monitor and sustain control, use, value, and ownership of IA’s throughout their economic, contributory, and functionality-materiality cycles, not necessarily for the lifetime of the company, as is the case with some IP registrations.
- re-frame application of (information asset) safeguards away from conventional IP legal enforcements, i.e., patents, etc., to strategic business decisions and fiduciary responsibilities.
- address market entry planning with organization’s proprietary IA’s as distinguishable transactions that warrant risk assessment and pre-post due diligence.