The document discusses security challenges in mergers and acquisitions. It notes that acquired companies or divisions often have weaker security than the parent company. Attackers seek to exploit these weaker links to gain access to the larger company's systems. The document recommends starting security planning early in the M&A process through due diligence. It also suggests conducting a security gap analysis and network segmentation when integrating an acquired company. Establishing security ownership and developing an M&A security playbook can help mature security practices for mergers and acquisitions over time.
1. Security in Mergers and
Acquisitions (M&A)
Going After the Weak Link
November 29, 2017
Security in Mergers and Acquisitions -
Unclassified – External – Approved. V.2.0
Miriam Levenstein