{"id":13303,"date":"2016-04-18T05:00:34","date_gmt":"2016-04-18T12:00:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=13303"},"modified":"2016-04-14T13:27:42","modified_gmt":"2016-04-14T20:27:42","slug":"ma-due-diligence-must-include-cybersecurity-considerations","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/04\/ma-due-diligence-must-include-cybersecurity-considerations\/","title":{"rendered":"M&#038;A Due Diligence Must Include Cybersecurity Considerations"},"content":{"rendered":"<p>Mergers and acquisitions (M&amp;A) are a regular occurrence in the business world. And while we\u2019re all familiar with concept of due diligence when it comes to judging the financial performance of another company, it\u2019s time for enterprises to start applying that same level of scrutiny to the cybersecurity capabilities of a potential acquisition. A thorough review of an acquisition\u2019s security architecture, processes and policies should be a firm requirement for any M&amp;A process.<\/p>\n<p>But where should the cybersecurity due diligence process begin? As a CISO, I recommend that companies start by confirming their acquisition target\u2019s past investments in cybersecurity were made in a manner commensurate with the growth of the company.\u00a0 Ask the following:<!--more--><\/p>\n<ul>\n<li>Have baseline investments been made not just in detection controls but also in more proactive and preventative measures to protect data?<\/li>\n<li>Have investments been made in ensuring that Information Security staff are on hand to support the management of risk?<\/li>\n<li>Have non-IT employees gone through cybersecurity training?<\/li>\n<li>Can acquirers establish with confidence that the company being assessed has not already been breached?<\/li>\n<\/ul>\n<p>Due diligence should be maintained throughout the entire M&amp;A process, particularly before information about the activity goes public. While I don\u2019t have specific numbers, I think it\u2019s safe to assume that\u00a0there have been situations in which a hacker or less than scrupulous employee have hacked an enterprise network in search of material information they could exploit for their own financial gain before news of an M&amp;A became public. The fallout of such activity could be extreme, so\u00a0it\u2019s important that acquirers and those looking to be acquired consider and implement the appropriate cybersecurity controls to ensure proprietary information doesn\u2019t leak.<\/p>\n<p>The constant stream of security breaches in the news have gained the attention of executive leadership and boards of directors who are now looking to their CSOs\/CISOs to minimize their risk exposure when contemplating major business moves like an M&amp;A.<\/p>\n<p>I would encourage my fellow CISOs (or any other executive looking for guidance and recommendations around cybersecurity policy guidance) to visit <a href=\"http:\/\/securityroundtable.org\" rel=\"nofollow,noopener\"  target=\"_blank\">SecurityRoundtable.org<\/a>, a community designed to share best practices, use cases and expert advice to help executives better manage cybersecurity risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mergers and acquisitions (M&amp;A) are a regular occurrence in the business world. And while we\u2019re all familiar with concept of due diligence when it comes to judging the financial performance of another &hellip;<\/p>\n","protected":false},"author":183,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89,155],"tags":[386,1874,1499],"coauthors":[1875],"class_list":["post-13303","post","type-post","status-publish","format-standard","hentry","category-ciociso","category-cybersecurity-2","tag-ma","tag-mergers-and-acquisitions","tag-securityroundtable-org"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/183"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=13303"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13303\/revisions"}],"predecessor-version":[{"id":13305,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13303\/revisions\/13305"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=13303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=13303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=13303"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=13303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}