Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Cybersecurity in Mergers and Acquisitions (M&A)

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige

Hier ansehen

1 von 9 Anzeige

Weitere Verwandte Inhalte

Ähnlich wie Cybersecurity in Mergers and Acquisitions (M&A) (20)

Weitere von EyesOpen Association (20)

Anzeige

Aktuellste (20)

Cybersecurity in Mergers and Acquisitions (M&A)

  1. 1. 1.Mergers and Acquisition (M&A) 2.Are you acquiring the risks too? 3.What mistake did they do? 4.Value cybersecurity brings to M&A 5.When to start? 6. Questions PLAN
  2. 2. “72% CEOs expect to pursue an acquisition seeking revenue growth, talent and transformations” EY 2022 CEO Survey “65% CEOs say M&A, joint ventures and/or strategic alliances collectively will form the most important strategy for achieving three-year growth objectives” KPMG Mergers and Acquisitions (M&A)
  3. 3. Post Integration Integration Mergers and Acquisitions (M&A) continued.. Due Diligence Target Evaluation Target merger, capture synergies Integration Completion, Business as Usual M&A’s are Complex Size Disruptive Stake Involved
  4. 4. Are You Acquiring The Risks Too? The ever-evolving threat landscape Viruses Spams and Spywares Botnets Targeted Attacks Ransomwares State Sponsored R i s k s Complexity
  5. 5. What mistake did they do? Verizon/ Yahoo Marriott/ Starwood My Fitness Pal/ Under Armour Impact: $350M Fines: $35M Impact: $123M Fines: $375M Impact: $130M Fines: Lawsuit
  6. 6. Value Cybersecurity brings to M&A Protects the deal value Identify Synergies Uncover operational risks Flag prior breaches and impacts Identify risks related to regulations Build cyber operating model
  7. 7. When to start? Cybersecurity starts with the inception of the deal transaction Post Integration Integration Due Diligence Target Evaluation Red flag/ Risk Report Target merger, capture synergies Cybersecurity Integration and Standardization Integration Completion, Business as Usual Cybersecurity KPIs
  8. 8. M E R C I ! T H A N K Y O U ! QUESTIONS ?

×