The hidden costs of an IP breach: Cyber theft and the loss of intellectual property has been saved
Losing customer data to hackers can be costly and embarrassing, but losing intellectual property to cyber thieves could threaten a company’s future. The first step toward prioritizing IP protection and incident readiness: properly valuing possible IP losses.
It’s a business leader’s nightmare—the stomach-churning realization that a corporate network breach has occurred, and that valuable intellectual assets are now in unknown hands. For a US government lab, it could be foreign agents stealing blueprints for a new weapon system; at a biopharmaceutical firm, staff scientists might take confidential data on a potential cancer cure; or at a game developer, hackers could filch the latest first-person shooter game, pre-release. And most terrifying: Because the information exists in the form of data rather than, say, manila folders in file cabinets, a breach might remain undiscovered for weeks or months.
Compared with more familiar cybercrimes such as the theft of credit card, consumer health, and other personally identifiable information (PII)—which regulations generally require be publicly reported—IP cyber theft has largely remained in the shadows.
These kinds of scenarios keep executives up at night for good reason: Intellectual property (IP) is the heart of the 21st-century company, an essential motor driving innovation, competitiveness, and the growth of businesses and the economy as a whole. Intellectual property can constitute more than 80 percent of a single company’s value today.1 It’s no surprise, then, that thieves—armed with means, motive, and opportunity—are in hot pursuit.
Learn More
View the Dbriefs webcast
Explore the Cyber Risk Management collection
Read Deloitte Review
Though IP theft is hardly new, and some IP may still be attainable only through physical means, the digital world has made theft easier.2 According to US Intellectual Property Enforcement Coordinator Danny Marti, “Advancements in technology, increased mobility, rapid globalization, and the anonymous nature of the Internet create growing challenges in protecting trade secrets.”3 (See the sidebar “US administration’s commitment to trade secret protection.”)
The President5 continues to remain vigilant in addressing threats—including corporate and state-sponsored trade secret misappropriation—that jeopardize the United States’ status as the world’s leader for innovation and creativity. Advancements in technology, increased mobility, rapid globalization, and the anonymous nature of the Internet create growing challenges in protecting trade secrets. Through a coordinated, multiagency, and multifaceted strategy, this Administration continues to engage foreign governments to strengthen international enforcement efforts, promote private and public sector initiatives to develop industry-led best practices to protect trade secrets, and raise public awareness to inform stakeholders and the general public on the detrimental effects of trade secret misappropriation to businesses and the US economy.
As a part of this strategy, businesses also play a significant role in addressing the growing challenges of protecting trade secrets. The first line of defense against trade secret theft is often the existence of a robust and well-implemented cybersecurity and data management/protection strategy, along with contingency planning in the event of the occurrence of a material event. The Administration encourages companies to consider and share with each other practices that can mitigate the risk of trade secret theft, including approaches to protecting trade secrets that keep pace with technology.6
—Danny Marti, US Intellectual Property Enforcement Coordinator, Executive Office of the President
Yet, compared with more familiar cybercrimes such as the theft of credit card, consumer health, and other personally identifiable information (PII)—which regulations generally require be publicly reported—IP cyber theft has largely remained in the shadows. Most cases receive no widespread attention, perhaps because the impact to the public is less direct—and because, considering the potential brand and reputational damage, companies have little incentive to report or publicize such incidents. Plus, compared with PII breaches, IP theft has ramifications that are harder to grasp: fewer up-front, direct costs but potential impacts that might metastasize over months and years. Theft of PII might quickly cost customers, credit ratings, and brand reputation; losing IP could mean forfeiture of first-to-market advantage, loss of profitability, or—in the worst case—losing entire lines of business to competitors or counterfeiters.
Leaders may, understandably, struggle to accurately measure such indirect hypothetical impacts; as a result, behind closed doors, they rarely give IP cyber theft the attention it deserves.4 Without considering the broad ramifications of a cyberattack involving enterprise IP, companies often neglect to appropriately prioritize IP protection and incident readiness.
The good news for executives is that there is an approach to value the spectrum of losses from IP cyber theft, based on generally accepted valuation and financial modeling principles, so that they can position IP within a broader enterprise cyber risk program. With better information about the risks surrounding IP, its potential loss, and the impact this loss could have on the company, executives can understand the full ramifications of IP theft, enabling better alignment of their cyber risk program with the company’s IP management and strategic priorities.
Historically, IP theft primarily took the form of disgruntled or opportunistic employees absconding with documents, computer disks, or prototypes. A wrongdoer had either direct knowledge of, or was able to gain, physical access to perpetrate the crime and extract the trade secrets, in whatever form. The small number of people with physical access limited the pool of suspects, often making such theft a risky proposition.
By contrast, in a digital world, IP thieves can operate from anywhere in relative anonymity, making the pool of possible suspects both wide and deep. Perpetrators can include current and former employees, competitors, criminal and recreational hackers, and foreign-nation state actors. IP theft can be a primary motive—or an opportunistic exploit: When corporate data can more easily be stolen in bulk, the odds increase that nuggets of IP can be found within broad swathes of data.7
When being first to market can dictate market winners, stealing IP—or purchasing stolen IP—can be much faster and cheaper than investing to innovate from scratch. In some fields, research and development (R&D) costs are escalating, while market opportunities are shrinking. With, for instance, a finite number of viable oil fields and high barriers to creating a new patentable drug to treat a particular condition, theft of a competitor’s trade secret might promise a more certain path to quick profit.
What assets are most at risk? Naturally, thieves are primarily after corporate secrets, rather than IP already in the public domain, such as patents and trademarks. Most valuable to perpetrators are trade secrets and proprietary business information that can be monetized quickly. Trade secrets can include drug trial data, a paint formula, a manufacturing process, or a unique design; proprietary business information might include a geological survey of shale oil deposits, merger plans, or information about business negotiations and strategies. Copyrighted data, such as software code for data analytics, is also now a popular target. With such a broad scope of information of value in different illicit marketplaces, IP theft is an issue across nearly every industry and sector.
Compliance and regulatory disclosure requirements generally shape corporate attention to the impact of cyberattacks. In light of well-publicized incidents at leading retail chains, health care companies, banks, and government agencies, those requirements largely center on the theft of PII, payment data, and personal health information. Most states require organizations to disclose such attacks to customers and employees whose information may have been stolen,8 and federal securities regulations require corporate disclosure of significant PII-related cyber events with potential material impact.9 As a consequence, corporate discussions about the impact of cyberattacks tend to focus on costs common to these types of attacks, including those for customer notification, credit monitoring, legal judgments, and regulatory penalties. It helps that there’s plenty of precedent, based on those high-profile data breaches, to help executives calculate their companies’ exposure in case of a PII leak.
In contrast, when it comes to speculating about the cost of potential IP breaches, many of those costs are “hidden” or indirect and therefore difficult to identify and quantify (figure 1). They include not only well-understood cyber incident costs—such as expenses associated with regulatory compliance, public relations, attorneys’ fees, and cybersecurity improvements—but also less visible and often intangible costs that stretch out over months or even years, including devaluation of trade name, revoked contracts, and lost future opportunities. As challenging as it may be for executives to assess these longer-term and indirect costs, identifying and quantifying the full gamut of potential IP losses is essential to a company’s ability to prioritize its cyber defense efforts.10
In considering the applicability of financial risk models to cyber risk, “Quantifying risk,” elsewhere in this issue of Deloitte Review, asserts that while standard models can be useful, it is important to develop well-defined cyber risk models that align with the nature of a given business.11 The approach illustrated here considers the specific circumstances of an organization at a particular point in time.
To create the accurate estimates of cyber risk needed to make informed decisions, executives must understand exactly how the full range of impacts might play out over time. To do this, a company should consider a time frame encompassing the potential long tail following a breach, which can be roughly broken into three phases:
To model the costs within each phase, organizations can apply a multidisciplinary approach, using knowledge of their business alongside a likely cyberattack scenario to understand what actions may be required. They can then apply accepted valuation techniques to calculate the breach’s true cost. Mapping these costs across the three phases can then provide business leaders with a more accurate depiction of a company’s cyber risks throughout the response life cycle.
To illustrate the valuation process described above, consider the following scenario involving a fictitious $40 billion IT company. The company, Thing to Thing, develops networking products supporting the management of Internet of Things (IoT) technology.
The Silicon Valley-based company, with 60,000 employees and a 12.2 percent operating margin, has made a significant investment in R&D, production, and marketing to support the development and release of a core IoT network product. Six months before the product launch, a federal agency informs Thing to Thing of a cyber breach at one of its facilities hosting the new innovation. The initial investigation discovers that foreign nation-state cyber thieves have purloined IP relevant to 15 out of 30 network device product lines, projected to contribute one-quarter of the company’s total revenues over the next five years. While the hacker’s motives are unclear, an analysis concludes that the information could allow the hacker to unearth and exploit previously undiscovered design flaws or, worse, implant malicious code into Thing to Thing’s new products. With even more serious implications, 30 days after the breach alert, a prominent Silicon Valley blogger reports evidence that the foreign nation-state is reverse-engineering the networking product, suggesting that it could beat Thing to Thing to market and undercut the firm on price.
A scenario-based methodology—positing specific breaches of varying scope and severity, and modeling their impact—permits a realistic and revealing exploration of the IP life cycle to more deeply identify potential risks in the movement and storage of sensitive company information, whether they be external, internal, malicious, or accidental.
During the initial triage phase, Thing to Thing hires big guns from a top PR firm to reach out to stakeholders and create a face-saving public image campaign. In addition, the company retains attorneys and a forensics firm to investigate the event, and a cybersecurity firm to help triage and remediate the breach.
During the impact management phase, the company is forced to suspend planned sales and shipments of its new products while it develops and rolls out upgraded firmware to affected devices. Although R&D staff are already overextended, Thing to Thing decides to accelerate the new device release by two months rather than be scooped by the cyber thieves—a decision that forces the company to take on additional R&D talent. But loss of confidence in Thing to Thing’s ability to protect its own network environment as well as the security of its products intensifies: The government cancels a key contract, projected to contribute 5 percent of revenues, and the company suffers an additional 5 percent drop in revenue as current customers and clients step back.
Longer term, during the business recovery phase, the company conducts an enterprise-wide assessment to develop a stronger cyber risk management strategy and implementation plan. This spawns various initiatives, including an IP inventory, classification, and protection program and enterprise security infrastructure upgrade projects—all of which drive additional costs. Additionally, investigation and litigation costs associated with the breach extend over years, as do PR costs to rebuild consumer and stakeholder trust. Product sales finally return to normal after a year, but business disruption across multiple departments, caused by the redirection of company resources to deal with the breach, drags down operating efficiency.
The cyber incident response timeline in figure 2 describes how the events and impacts of this breach scenario might unfold over time. Of the 14 impact factors that typically comprise the total impact of a cyberattack,12 some—such as breach notification costs or post-breach monitoring offerings—do not apply in Thing to Thing’s case, as they might in a PII data breach. The company does face other direct costs associated with legal counsel, PR, investigation, and cybersecurity improvements, which are relatively easy to identify and, to some extent, quantify.
The IP theft’s more indirect and deferred costs are harder to identify and to calculate, including the loss of the value of the stolen IP itself, operational disruption, lost contracts, devaluation of trade name, and higher insurance premiums (table 1). In total, over time, Thing to Thing analysts calculate that this one IP cyber theft incident costs the company over $3.2 billion.
We take two of Thing to Thing’s key losses from the IP theft—the networking product’s integrity and the five-year government contract—to illustrate the valuation methodologies for less tangible costs. Valuation of both the impact of the stolen IP and the lost contract employs the following generally accepted principles:
In addition to utilizing these principles to calculate the lost IP’s value, the company assumes the IP to have a useful life of five years. We know from the facts set out in Thing to Thing’s scenario that the company attributes 25 percent of its total revenue to product lines impacted by the stolen IP. The calculations of financial impact also assume a 2.5 percent royalty rate for potential licensing scenarios associated with the IP, which is based on comparable license agreements for related technologies and the profit margins of public technology hardware companies. This royalty rate is used to ultimately assess value. Finally, based on the risks associated with this type of IP, a discount rate of 12 percent is used to perform the discounting necessary as described above. Applying these financial modeling techniques and the underlying assumptions, analysts conclude that the loss of this IP costs the company roughly $150 million.
To calculate the value of the government contract, again we consider the facts stated in Thing to Thing’s scenario that the contract, covering five years, contributes 5 percent of the company’s total annual revenue. The net cash flows generated by the company over a five-year period with the contract in place were discounted using a 12 percent discount rate to yield a value of $15 billion. Loss of the contract results in a 5 percent decline in annual revenues and a 2 percent drop in profit margin (with the decline in revenue, the company functions under a lower operating base since its fixed costs are spread over a lower revenue base), resulting in a loss in value of more than $1.6 billion.
These two examples are only a portion of the total cost of an IP cyber breach as referenced by the above chart. And while a well-meaning executive may not look beyond the (sizable) value of the lost IP itself, the true impact to the business is much greater. In this case, the $150 million value of the lost IP represents a small fraction of the $3.2 billion total.
The goal of the scenario above is not to shock with alarmingly high figures but, rather, to highlight the impacts that matter most in the aftermath of a cyber breach so that executives can understand the full ramifications of IP theft. Once executives realize the importance of protecting digital IP, this scenario can also help guide an examination of their own organization’s preparedness. By walking through possible attack scenarios and drafting a truer picture of how the business could be affected, organizational leaders can then create an informed strategy on how they manage cyber risk around the protection of their IP.
A scenario-based methodology—positing specific breaches of varying scope and severity, and modeling their impact—permits a realistic and revealing exploration of the IP life cycle to more deeply identify potential risks in the movement and storage of sensitive company information, whether they be external, internal, malicious, or accidental. Working through a scenario can help quantify IP loss’s often-hidden costs and wide impact. Putting a value on the potential damage and making visible the unseen cost can initiate productive dialogue at the executive and board levels. Equipped with concrete data, executives can then make informed decisions on where best to invest to minimize the costliest impacts. A vague and dreaded threat becomes more defined, and the enemy starts to look like one that can be vanquished with proactive strategies and defenses. Evaluating IP risk across the entire development life cycle turns fear of a potentially devastating cyberattack into confidence: Even if hit by cyber thieves, the organization is positioned to respond and recover.
This increased awareness can then translate to the integration of cyber risk strategies into the company’s overall IP management strategy. The Deloitte Review article “Wizards and trolls: Accelerating technologies, patent reform, and the new era of IP” outlines nine dimensions that IP strategy should encompass.13 However, as the means and motive for cyber theft increase, leaders should move to include a cyber risk dimension in the company’s IP management strategic framework (figure 3). Executive-level governance of the IP program overall must both include explicit oversight of cyber risk management elements and recognize that many of the other IP program elements have associated cyber risk issues.
A more comprehensive cyber risk approach might involve developers, IT, legal, risk management, business, and other leaders to synchronize and align the organization’s IP strategy with an effective cyber risk program so that appropriate security controls, monitoring, and response processes are put in place across the IP life cycle. Particularly important is to understand the value of, and safeguard, IP in its early, emerging stages. Relying on IP protection tactics, such as being “the first to file” or “sensing and blocking” to protect a company’s most valuable secrets—while important—fails to recognize that IP has value even before it is “mature.” IP in its beginning development stages can be equally valuable to competitors or adversaries long before the decision to file a patent is made. Therefore, the need for speed to protect IP in its digitized form at all stages of its life cycle has increased exponentially—at least commensurate with the speed at which an adversary can gain access to and abscond with a company’s most cherished secrets.
Given their importance to growth, market share, and innovation, IP and cyber risk should rightly sit with other strategic initiatives managed at the C-suite level. One important consideration for top executives is to make sure that the cyber risk element of the organization’s IP strategy fits into its broader enterprise risk approach and IT/cyber risk framework.14For example, the risk assessment methodology and metrics used to assess IP cyber exposures should align with the way other parts of the enterprise measure risks. The entire cyber risk program, including its IP component, should roll up under the organization’s enterprise risk management program to give management visibility into IP cyber risks in the context of all risks.
Given their importance to growth, market share, and innovation, IP and cyber risk should rightly sit with other strategic initiatives managed at the C-suite level.
With this contextual awareness of risk, executives can ask hard questions to probe how effectively the company is managing its IP in addition to how well the cyber risk program is integrated into that process. In practice, these questions might include:
Finally, while improved security—in the classic sense of policies and technology controls—can improve the odds of preventing a heist, zero-tolerance prevention is impossible. How well an organization responds to a breach can mitigate the toll it takes—a theft need not cost $5 billion. Incident response is learned through experience, but that doesn’t have to mean waiting for a real incident to occur. Simulating cyberattacks provides a practice ground to test the ability of technical and business teams to analyze and restore core mission processes and—more importantly—the ability of the entire organization to act decisively. Practice helps leaders “know what they don’t know” and results in better-honed incident response plans for the inevitable “real thing.”
With the essential contribution of IP to companies’ core business and the ever-present danger of IP cyberattacks, managing the risk of IP theft must become an integral part of corporate IP strategy under the purview of the CEO, CFO, general counsel, and, equally important, the CIO and CISO. Corporate IP strategy must include cyber risk elements alongside R&D, patent and copyright, monetization, and other IP plans. Knowing that risks are rising, top executives owe it to investors, employees, customers, and partners to defend IP with the company’s best efforts. For corporate leaders and their stakeholders, the goal is the same: protecting and enabling valuable innovations to support the company’s future competitiveness and growth.
In doing so, building true resilience requires a firm-wide strategic focus from the top of the organization on the overall business risk that IP cyber theft poses. Knowing exactly what IP a company possesses, where and how that IP is safeguarded, and incorporating IP cyber protection into the overall IP management program should be integral to strategy. When IP is the driver of growth and competitiveness for so many companies, understanding the full impact of its potential loss or misuse is a good start toward managing the risk and moving from simply recognition to action. DR