Michael D. Moberly…I am an intangible asset strategist, risk specialist, trainer, author, and researcher. I am among a niche of national practitioners whose (client) services, blog, publications, and research are produced, almost exclusively, through an intangible asset lens.
Clients whom I serve…seminar attendees to whom I speak, colleagues whom I collaborate, and practitioners I have lead describe me, my work, and engagement demeanor as respectful, ethical, collaborative, and focused which manifest as strong professional commitments to guide clients, companies, and businesses to…
• – identify, unravel, develop, assess, and exploit intangible assets’ value, competitive advantages, and sources of revenue.
• identify and mitigate risks to and safeguard key intangible assets in play relative to business transactions, R&D, new product entry, and other initiatives a business may undertake to compete in today’s always on…go fast, go hard, go global operating environments.
• sustain control, use, ownership, and monitor value and materiality of intangible assets, throughout each assets’ life, value, materiality, and functionality cycle.
I Lead A ‘Learning Consultancy’ That Embody The Principles Of…
• being continuously engaged in and applying relevant ‘self-learning’ to advance the quality, expertise, and range of (client) deliverables, and integrating same to benefit each circumstance clients may present.
• bringing operational clarity-familiarity to client’s IA’s as objective foundations to assess-measure IA performance, materiality, and risk.
• demonstrating how intangible asset development, conversion, risk mitigation, and exploitation can mesh with (compliment, advance) each client’s capabilities for generating new sources of revenue, competitive advantage, elevate value and reputation, contribute to sustainability, and create resilience.
• ensuring relevant issues are brought to client’s attention with sufficient clarity to make informed decisions.
I Receive Professional Satisfaction From…working with intangible asset intensive – dependent go fast, go hard, go global, go black businesses, and their management teams, irrespective of sector, size, or revenue. Satisfaction emerges largely from the receptivity and speed which entrepreneurially focused (visionary) management teams, boards, c-suites, investors, and shareholder’s attention is drawn to fiduciary responsibilities affecting the intangible asset-side of their businesses.
Seven Personal Practices That Contribute To Effective – Favorable Client Engagements and Outcomes…
1. remaining inquisitively current on matters related to IA’s as exhibited in 800+ (long form) blog posts and papers and books I have written.
2.20+ year professional commitment to all things intangible.
3.recognizing the various ways-circumstances clients’ intangible assets are in play, i.e., as business operations, processes, transactions, and R&D, etc.
4.consistently articulating IA issues in an informative, learned, respectful, and collaborative manner.
5. bringing operational clarity about how, when, and the various circumstances IA’s develop, mature, and ultimately embed in business processes and products in the form of intellectual, structural, and relationship capital.
6. demonstrating practical, viable, lucrative, and client specific strategies for converting the contributory role and value of IA’s to sources of revenue, competitive advantage, reputation, and brand.
7. unraveling the origins and assessing the status of clients IA’s, i.e., ownership, stability, fragility, materiality, competitive advantages, and ‘contributory role and value’.
Attached to this site are numerous excerpts of recorded (video) interviews extracted from media appearances and journalistic initiatives.
Research Projects Independently Undertaken (examples)…
1. State-corporate sponsored economic espionage – competitive business intelligence operations directed toward corporate – university R&D.
2. Public Radio large market stations with sufficient resources to produce programming to distinguish and exploit contributing IA’s for value, competitiveness, listener expansion, and fund-raising contexts.
3. Insider Theft Project coordinator, conducted in conjunction with DoD’s Personnel Security Research Center and ASIS International’s Information Asset Protection Council, which I chaired.
4. Uniform Franchise Operating Contracts, to compare-contrast content for distinctive practices, information designated as proprietary – trade secret.
5. Competitive-business intelligence operation methodologies and speed of targeting – interaction with early stage companies – research-based startups.
6. Pre-post business transaction due diligence…developed methodologies for determining, measuring, monitoring, and sustaining IA’s contributory role-value.
7. Islamic (Sharia) (intellectual property) law interpretations – application.
8. ‘Stolen Valor’ (false claims of military awards, Vietnam War era) in conjunction with ‘It’s Time We Ask’ project.
9. Organizational resilience and risk tolerance related to companies’ IA’s.
10. Technology transfer and IA’s, primarily (university) research based startups.
11. Venture capital – investor forums; advising research-based startup teams for Q&A from venture capital-investors related to their IA’s and primary IP position.
12. Corporate-university research liaison services designed to sustain control, use, ownership, and value of IA’s.
I Served As A Principle Research Investigator…to the national ‘Trends In Proprietary Information Loss’ Survey for U.S. headquartered companies. I and three colleagues designed and wrote areas of inquiry for survey co-sponsored by the American Society for Industrial Security International Foundation and the Office of the National Counterintelligence Executive. The Survey’s findings…
• provided substantive insight for strategic responses to globally asymmetric risks to proprietary IA’s (and IP).
• were incorporated into ONCIX’ ‘Annual Report to the President on Economic Espionage’ and routinely sited – referenced by the executive and legislative branches respectively, national media, and leadership of U.S. headquartered companies as markers for strategic action.
Client Briefing Papers…I have independently – experientially written papers on a range of issues-topics, some produced at the behest of clients, as-a-means to bring (operational level) clarity, context, and solution strategies for specific IA issues, risks, transactions, and other IA-related challenges being experienced, e.g.,
1.Enterprise Risk Management
- Building a ‘Corporate Culture’ For Safeguarding Intangible Asset
- Stewardship, Oversight, and Management of Lucrative, Proprietary, Competitive Advantages IA’s: What Decision Makers Are Obliged To Know, Now.
- Planning For Company’s IA’s: An Often Overlooked Necessity (Retrieving IA’s Following Catastrophic Business Events To Achieve A Speedy and More Complete Economic Recovery
- Assessing Intangible Asset Attractivity, Demand, and Targeting From Sophisticated Global Business Intelligence Operations, Infringers, Counterfeiters, and Country Specific Entities Engaged In Economic Espionage
- Insiders: Factors That Contribute To Theft-Infringement of Proprietary IA’s and IP
- Unraveling and Assessing IA Safeguards for R&D Projects
- Reduce Vulnerability-Probability-Criticality of Time Consuming and Costly Disputes, Challenges, and Entanglements Involving Proprietary IA’s.
- Assessing Stability, Fragility, Defensibility, and Value Dilution of IA’s In Play
- International R&D Collaborations: Challenges, Considerations, and Prudence
- Safeguards to Avoid Proprietary IA ‘Genies’ From Escaping Their R&D Bottles’ Prematurely
4.Market Entry Planning, Monitoring, and Due Diligence for IA’s
- Beat The Odds Against Proprietary IA Theft, Infringement, Misappropriation, Compromise
- Recognizing Nuanced Requirements and Risks to Country Centric IP Law Before Collaboration Commences or Transactions Are Executed
5. Intangible Asset Pre-Post Transaction Due Diligence
- When 80% Of An Investment’s Value Lies In IA’s, Conventional, Generic, One Size Fits All – Snap-Shot-In-Time Checklists Seldom Convey Transaction Realities and Risks
- IA Impairments, Entanglements, Compromises, and Fragility Are Frequent Precursors to Potentially Profitable Transactions Going Bad
- Pre-Post Covenants to Merger & Acquisition Transactions to Monitor The Status, Stability, Fragility, Value, and Sustainability Of IA’s
- Indicators – Precursors That A Company’s IA’s Have Become Impaired, Ensnared, Infringed, or Compromised
- Protocols for Investigating Claims of Trade Secret Misappropriation and Value
- Conventional IP Registrations Are No Longer Stand-Alone Deterrents
- Categories and Origins of Foreign-Domestic Business-Competitive Intelligence and Economic Espionage
6. Investing in R&D, Early Stage, Research-Based Startups
- What’s Your IP Position’? Going Beyond The Obligatory, To Mitigate Investor Risk
- VC-Investor Exit Strategies Should Include Resilience Plans For Both The IA’s and Proprietary Competitive Advantages In Play
- Interest-Based Bargaining: A Realistic Tool – Methodology For Universities and Researchers To Engage Opportunities For Technology Transfer
- Avoid Treating IA’s As Renewable Resources
- Preparing Early Stage Company Management Teams To Pitch Prospective Investors and VC’s Insofar as IA Safeguards
- University – Corporate Research Consortiums: Ensuring IA Safeguards, Beyond Conventional IP Enforcements, Are Effectively In Place
- Academic Freedom and Open Scientific Communication: Re-Framing These Time Honored Hallmarks, Advancing This Debate Beyond Its 16th Century Origins
- Global Challenges Posed By Ultra-Sophisticated Data Mining and Competitor/Business Intelligence Collection and Economic Espionage
Published Papers (examples)…
1. Safeguarding Proprietary Information: The Worldwide Competitor and Economic Intelligence Phenomenon (Published in Cyber Strategies: Vol. 2, No.2, Summer, 2000)
2. IP Due Diligence for Venture Capital and Angel Investors: Don’t Buy Unnecessary Risk! (Triangle Tech Journal, January 2005)
3. Off-Shoring Intellectual Capital: Is History Repeating Itself? Are There Lessons Learned From Y2k? (Memphis Business Journal, February 2004).
4. It’s The Information Stupid! (Protection of Assets, August – September 2001).
5. Moberly, M. D., & Cheon, J. (2009). Use intangible assets to weather the financial crisis. Intellectual Asset Management Magazine, 33. 14-18.
6. Moberly, M. D., & Cheon, J. (2011). Enterprise Security. Intellectual Asset Management Magazine, 45, 66-72.
7. Moberly, Michael D. (2013) Intangible Assets: Safeguarding What Really Matters to Companies. Intellectual Asset Management (UK)
8. Moberly, Michael D. (2010) Enterprise Security. Intellectual Asset Management (UK)
- ‘Safeguarding Intangible Assets’ Elsevier, July 2014 – This book represents the initial treatise on businesses’ expanding fiduciary responsibilities to ‘sustain control, use, ownership, and monitor the contributory value, materiality, and risk’ to their intangible assets.
- ‘On-Boarding for University Technology Transfer’ (a principal contributor) published in series by Business Valuation Resources, Portland, OR – I lead-collaborated with a team of experts in researching and writing a comprehensive paper that serves as an ‘on-boarding’ primer (book) targeting university-based research communities engaged in technology transfer.
- I am currently in latter stage of completing a new book which focuses on business-company-institution operational obligations and demonstrated strategies to identify, develop, monetize, commercialize, and safeguard their IA’s for positive returns and competitive advantages and their conversion to value, competitive advantage, sources of revenue.
I Have Conducted 70+ Presentations, Seminars, Webinars, Advisories, Briefings, and Media Appearances…nationally – internationally for companies, professional associations, government agencies, and private (business-security) groups wherein my professional counsel and discreet demeanor have provided entrée for developing diverse domestic-international ties and acquiring operational level insights to circumstances in which knowledge, practical experience, ethics, trust, and respect are requisite attributes. Examples include…
1. National Public Radio – Morning Marketplace Program – Recommended to show producer by colleagues to discuss ‘rise of trade secret theft in the U.S.’
2. European Information Asset Protection Conference – London, UK – Invited keynote speaker. Topic: Safeguarding Proprietary Corporate Information
3. CNBC Investing – MSN Money. Recommended to show producer by colleagues to engage in live interview regarding a trade secret theft case.
4. CNN’s evening news program. Topic: Economic espionage.
5. Society of Certified Public Accountants, Memphis, TN – Topic: Invited to speak Valuing Intangible Assets
6. Shanghai, China – Entering New Markets and Safeguarding Proprietary IA’s. (U.S., U.K., and Chinese owned firms. (This occurred in a series of independent meetings-presentations with managing directors of relevant firms.)
7. Naval Post Graduate School, National Security Affairs Department, Monterey, CA Topic: Invited to discuss my research regarding economic espionage product-company targeting by adversaries with department chair.
8. Oxford University – Invited podcast speaker to EU Intangible Asset Organization. Topic: Safeguarding Intangible Assets.
9. Foreign Military Studies Office, Ft. Leavenworth, KS – Topic: Economic espionage.
10. National Academy of Sciences, Government-University-Industry Research Roundtable (Washington, D.C.) Topic: Invited to speak about safeguards in university-corporate research alliances.
11. Federal Bureau of Investigation, headquarters, Washington. D.C., Invited by SAIC National Security Division, to discuss my independent research wherein I categorized foreign adversaries targeting university research.
12. George Washington University Graduate School, Washington, DC (three-time invited classroom guest lecturer for ‘Economic Espionage’ course.
13. National Classification Management Society, Huntsville, AL – Topic: Invited to make presentation regarding foreign adversaries targeting government – private sector R&D.
14. HQ’s, Army Research Laboratory, Adelphi, MD – Topic: Invited to speak to ARL officials regarding research on categorizing foreign (economic espionage) adversaries.
15. Center for the Study of American Business (Washington University at St. Louis) Topic: Effective use of corporate security (meetings with faculty – former CEO’s.)
16. University of Illinois-Chicago, Office of International Criminal Justice. Invited to speak, by program chair to a multi-nation audience of government – private sector security officials. Topic: Realities of Operationalizing Business IP Safeguards
17. Chicago Bar Association, Intellectual Property Section, Topic: Invited by Section Chair to conduct first ever presentation about Safeguarding IA’s to SRO audience.
18. American Society of Quality, Memphis, TN – Topic: Invited by Chapter Chair to make presentation about ‘Identifying, distinguishing, and assessing contributory value of IA’s to company operations’.
19. OPSEC Professionals Society Annual Seminar – two-time invited speaker (one a keynote) by OPSEC Executive Director to speak about converting principles of ‘operations security’ for application to private sector entities to safeguard their proprietary IA’s’. Clearwater, FL and Colorado Springs, CO (Peterson, AFB) where my presentation immediately followed remarks by the incoming Chairman, Joint Chiefs of Staff.
20. FBI InfraGard – Nashville, TN and Memphis, TN Chapters – Invited to speak about current research on safeguarding private sector IA’s and foreign adversaries
21. Academy of Criminal Justice Sciences, Orlando, FL Invited to speak to academic audience regarding my on-going independent research finding regarding Safeguarding University Research and mitigating risks of pre-mature disclosure, compromise, and/or theft.
22. U.S. Department of State, Director and Deputy Director, Overseas Security Advisory Council. Washington. DC: Invited to discuss my research on ‘Distinguishing and Assessing Economic Espionage Adversaries Preying on the Private Sector’.
23. Deloitte & Touche, Managing Director, IP Management Group, Chicago, IL – Invited by Managing Director (and his team) to discuss my research on economic espionage affects to U.S. private sector.
- In addition to the above, Mr. Moberly has been invited to make numerous other presentations to agriculture, chemical engineering, accounting, business, and economic faculty researchers, scientists, and research administrators at multiple universities, and private ‘think tanks’.
- Also, I have been invited to engage in – conduct numerous one-on-one briefings-discussions with various echelons of corporations and federal agencies regarding my independently conducted research, its findings-revelations and relevance to private and public sectors.
Service – Contributions To Professional Associations…respectfully, my colleagues frequently describe me as a ‘thought leader’ insofar as developing professional (trust-based) relationships with national and international firms, their executives, and security – asset protection practitioners, which in several instances lead to being nominated to hold-serve various appointments to professional association leadership, e.g.,
Intangible Asset Finance Society
• Chair, Program Development and Global Outreach – my responsibilities included elevating global awareness for Society initiatives.
• Secured global subject matter experts to headline monthly 60 minute telephonic – interactive seminars produced for Society membership.
• These monthly seminars contributed to the Society’s website going from 100+ monthly visitors to consistently 100k+ unique monthly visitors which translated as measurable global awareness, interest, and participation in IA initiatives.
American Society for Industrial Security International
• Chair, Information Asset Protection Council
• Convergence Task Force – Advisor-Member (invited)
• Education Symposia (Invited participant and group facilitator for six consecutive years.)
• Chair, Academic Programs Council
• Seminar program co-chair, ‘Y2k Security Seminar’ (Washington, DC)
• Information Security Task Force (Body of Knowledge) invited member. ASIS International
• Seminar (2-day) program chair – ‘Information Asset Protection’ (Denver, CO)
• Voted by colleagues and superiors as ASIS Internationals’ Council Chairperson of the year for 2013.
• My submission proposals were selected 7+ times for ASIS-International’s Annual Seminar & Exhibits (world’s largest security products-education venue)
Chair of ASIS Internationals’ Information Asset Protection Council
During my tenure as Council Chair, I and colleagues lead a successful effort to re-focus our collective expertise and re-articulated our global educational mission to…
- institute monthly (60 minute) ‘global guest and subject matter expert conference call training’ for Council members and 150+ ‘friends/colleagues of the Council’
- reflect the materialization of risks-threats not solely as severe IT breaches, rather as systemic events with probable adverse effects to organization’s portfolio of IA’s.
- reflect the economic fact that 80+% of most company’s value, sources of revenue, and wealth creation lie in IA’s which include intellectual properties
- re-frame the conventional (scope limiting) terminology conveyed by information security to the broader and more relevant information asset protection identifier.
- recognize the value of information (intangible) assets can fluctuate, therefore flexible-maneuverable safeguards should be applied to monitor and sustain control, use, value, and ownership of IA’s throughout their economic, contributory, and functionality-materiality cycles, not necessarily for the lifetime of the company, as is the case with some IP registrations.
- re-frame application of (information asset) safeguards away from conventional IP legal enforcements, i.e., patents, etc., to strategic business decisions and fiduciary responsibilities.
- address market entry planning with organization’s proprietary intangible assets as distinguishable transactions that warrant risk assessment and pre-post due diligence.
Other Professional Experiences Include…service in the U.S. Army (Vietnam War), federal and state corrections, a 20+ year career in academia, primarily at Southern Illinois University, from which I acquired domestic and international credentials and experiences, a strong work-research regimen, business engagement prowess, and communication skills. I hold BA and MPA degrees from Indiana University along with hours toward a doctoral degree in political science earned from Southern Illinois University.
Throughout My Tenure In Academia…I was engaged in aggressive paths of research, publishing, teaching, conducting national presentations, and consulting, all variously related to the field of ‘security studies’ with special emphasis on corporate and university R&D, economic espionage, and identifying, safeguarding, monitoring, and leveraging value, revenue, and competitive advantages produced by IA’s.