Close
Contact us
Close

Who Are Your Real Threats?

WEBINAR

Share this page:

Companies that have been sued within the last year, are almost four times more likely to sue another company. There’s no better time than now to check on your competitors.

You can’t develop a risk mitigation strategy that is going to work without first obtaining a solid understanding of where threats to your patent portfolio might lie.

Find out how you do this in our webinar ‘Who Are Your Real Threats?’ where we help you identify the red flags before they start waving.

The webinar covers:

  • Threat barometer analysis – instantly gauging your risk exposure
  • Propensity to litigate – causation or correlation?
  • Triaging your threats – in practice using OpenAI worked example

Moderator

Francesca Levoir, Head of Marketing

Panelists

Kacper Gorski, Head of Risk Solutions

Anna Plummer, Solutions Analyst

Find out more on what patent professionals are doing to mitigate patent risk in our report on the Management of Patent Risk:

Download Management of Patent Risk Report

See how Cipher can support with Risk Mitigation Management, or get in touch directly.

Hear Anna’s Key Takeaway

Who Are Your Real Threats? Webinar Recording

download

Webinar recording

  • Threat barometer analysis – instantly gauging your risk exposure
  • Propensity to litigate – causation or correlation?
  • Triaging your threats – in practice using OpenAI worked example

Insights & Thought Leadership

Europe’s Chemicals Industry: The Benefits and Risks Posed by the UPC

Examining the patent landscape of the chemicals industry in Europe following the establishment of the Unified Patent Court (UPC).
Read more

Key Patent Innovations and the BlackBerry portfolio

Following its acquisition by Key Patent Innovations, we revisited our analysis of the BlackBerry patent portfolio, identifying the areas at risk.
Read more

How innovation affects revenue for Big Tech

Big Tech firms thrive on innovation, and patents play a crucial role. Our analysis tracks the activity of Apple, Google, Microsoft and others over the last 20 years.
Read more

Meta’s Threads platform a direct challenge to Twitter

Our analysis finds that Meta’s patent portfolio illustrates its invention ownership strength in the technology stack that underpins the Twitter platform.
Read more

21st Century Evolution of Sustainable Plastic Technology Trends

To mark World Environment Day, Cipher tracks sustainable plastics technology innovators and owners in the 21st century.
Read more

The increasing importance of IP

How intellectual property (IP) moved into the business mainstream, as seen from the perspective of guests on the Cipher Vision Podcast.
Read more

With Cipher you can…

Portfolio Optimisation connecting cogs

Optimise your portfolio

Ensure you have the right portfolio to meet your strategic patenting objectives.

Read more
Competitive Intelligence

Gather competitor intelligence

Understand who’s doing what by automating patent to technology mapping.

Read more
Cross Licensing

Model cross licensing

Combine patent and revenue data to determine rational licensing outcomes.

Read more

Manage your budget

Justify patent budgets and communicate the impact of your investment.

Read more

Conduct due diligence

Automate manual reviews for efficient execution of M&A and licensing transactions.

Read more

Tackle inbound patent assertion

Be prepared with evidence to create a fast and effective threat assessment.

Read more

Benchmark your portfolio

Assess your portfolio in comparison to other owners through your technology lens.

Read more

Monetise your portfolio

Identify opportunities to create value through licensing or sale of patent assets.

Read more
Technology Trends icon

Predict technology trends

Track new technologies and discover the unknown owners of future innovation.

Read more
Icon of a meter

Create Risk Mitigation Strategies

Understand the materiality of your threats to define your risk mitigation strategy.

Read more

Improve your patent strategy now

Speak to the Cipher team today.

Arrange a callback