Major Topics:
Information security and decision making
Valuation issues
Identifying industry-specific security issues
Cyber due diligence
Buy v. Sell side
Potential post-transaction cyber liability
Risk mitigation
Preventative measures
Crisis management
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
MAJOR TOPICS:
Cyber breach preventative strategies
Cyber written policies and procedures
Response during and after a cyber crisis
GDPR
Third-party vendor issues
Best practices for the middle market
Corporate and board best practices
Cyber Insurance
Transactional effects and deal due diligence
Notable legal precedent
EY Principal and Cyber Threat Management Leader Anil Markose shows you best practices for cyber risk management and how to sense, resist, and react to cyber attacks on your company.
Presented by Dr Sam De Silva, partner at Nabarro to over 100 CEOs and Executives in London.
Explains what leaders should do immediately after becoming aware of a cyber attack, from a legal perspective.
It’s important to establish the balance sheet for security leadership to measure, monitor and report. Insurance is an important component to protecting the balance sheet. Don’t believe all of the fake news about cyber-insurance. This session will take you from theory to practice. How partnering with the insurance industry provides practical benefits to security leaders if you let it.
Learning Objectives:
1: Learn how to map cyber-risks to financial impacts.
2: Learn how to determine if your insurance covers the impact from an incident.
3: Overcome common myths around cyber-insurance and claims.
(Source: RSA Conference USA 2018)
CEOs leading Recovery from Cyber AttackKevin Duffey
This presentation was given to senior representatives from the Cabinet Office (UK Government), Capita, E.ON, Institute of Directors, Microsoft, Saga plc, Zurich Insurance, etc, at an event organised by Cyber Rescue on 29th June 2016.
Cyber Resilience: A New Perspective on SecurityIna Luft
Developing advanced cyber security strategies for the creation of a layered cyber defence, Cyber Resilience: A New Perspective on Security shall explore the establishment of a comprehensive defence from contemporary cyber threats to critical national infrastructure
As well as the strategies and architectures necessary for the establishment of this protection, the master class will explore optimal protocol for organizations of all sizes to take the necessary steps to prepare for the worst-case scenarios. Specifically, the ability to recover quickly in the event of a cyber-attack on their network and deal with the fall out of such an attack.
WHY YOU SHOULD ATTEND:
• Understand the contemporary threats to critical national infrastructure, the approaches of attackers and their intentions
• Master cyber security strategies and architectures for a thorough 1st line of defence
• from cyber threats, in doing so, build a more cyber resilient enterprise
• Prepare for the event in which your organisation’s cyber security is breached, effectively respond and recover by minimizing its impact and restore the functions of your people, processes and systems as soon as possible
EARLY BIRD DISCOUNT: Book by 29th January to save £100 – Book by 29th February to save £50
For more information and to register, please visit www.smi-online.co.uk/2016cyberresilience.asp or contact events@smi-online.co.uk.
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
MAJOR TOPICS:
Cyber breach preventative strategies
Cyber written policies and procedures
Response during and after a cyber crisis
GDPR
Third-party vendor issues
Best practices for the middle market
Corporate and board best practices
Cyber Insurance
Transactional effects and deal due diligence
Notable legal precedent
EY Principal and Cyber Threat Management Leader Anil Markose shows you best practices for cyber risk management and how to sense, resist, and react to cyber attacks on your company.
Presented by Dr Sam De Silva, partner at Nabarro to over 100 CEOs and Executives in London.
Explains what leaders should do immediately after becoming aware of a cyber attack, from a legal perspective.
It’s important to establish the balance sheet for security leadership to measure, monitor and report. Insurance is an important component to protecting the balance sheet. Don’t believe all of the fake news about cyber-insurance. This session will take you from theory to practice. How partnering with the insurance industry provides practical benefits to security leaders if you let it.
Learning Objectives:
1: Learn how to map cyber-risks to financial impacts.
2: Learn how to determine if your insurance covers the impact from an incident.
3: Overcome common myths around cyber-insurance and claims.
(Source: RSA Conference USA 2018)
CEOs leading Recovery from Cyber AttackKevin Duffey
This presentation was given to senior representatives from the Cabinet Office (UK Government), Capita, E.ON, Institute of Directors, Microsoft, Saga plc, Zurich Insurance, etc, at an event organised by Cyber Rescue on 29th June 2016.
Cyber Resilience: A New Perspective on SecurityIna Luft
Developing advanced cyber security strategies for the creation of a layered cyber defence, Cyber Resilience: A New Perspective on Security shall explore the establishment of a comprehensive defence from contemporary cyber threats to critical national infrastructure
As well as the strategies and architectures necessary for the establishment of this protection, the master class will explore optimal protocol for organizations of all sizes to take the necessary steps to prepare for the worst-case scenarios. Specifically, the ability to recover quickly in the event of a cyber-attack on their network and deal with the fall out of such an attack.
WHY YOU SHOULD ATTEND:
• Understand the contemporary threats to critical national infrastructure, the approaches of attackers and their intentions
• Master cyber security strategies and architectures for a thorough 1st line of defence
• from cyber threats, in doing so, build a more cyber resilient enterprise
• Prepare for the event in which your organisation’s cyber security is breached, effectively respond and recover by minimizing its impact and restore the functions of your people, processes and systems as soon as possible
EARLY BIRD DISCOUNT: Book by 29th January to save £100 – Book by 29th February to save £50
For more information and to register, please visit www.smi-online.co.uk/2016cyberresilience.asp or contact events@smi-online.co.uk.
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
Blog post discussing why CISOs need to collaborate with privacy, legal, and product teams to effectively identify and mitigate risk in their organization.
Does your business have a disaster preparedness plan? This SlideShare will cover all considerations necessary to formulate a comprehensive plan following the NFPA 1600 Standards followed by the US Department of Homeland Security.
Cybis is a leading cybersecurity consulting firm providing Agency Grade® solutions to private sector clients. Our team is staffed by former operators from the NSA, CIA, and Department of Defense who have a cross-disciplinary expertise and help clients manage their business’s value at risk. As former offensive cybersecurity operators, we “think like an attacker” to determine where and how our clients are most likely to be targeted, and to craft strategies of defense and resilience to protect the business. Our approach integrates the technical, physical, and human dimensions of security to identify, prioritize and remediate complex risks, and vulnerabilities.
An analysis and discussion of the many factors to be considered when talking about data breaches.
What is a breach?
What are data?
What costs are we talking about?
Whose costs are we talking about?
How do we estimate costs / impact?
How do we measure / estimate frequency?
Presented at Source Boston, April 18, 2012, Boston, MA
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Cohesive Networks
Slides from Cohesive Networks' COO Dwight Koop at the April 2015 meeting of the Chicago Electronic Crimes Task Force, sponsored by Cohesive Networks and the United States Secret Service.
On April 30, 2015 Dwight Koop presented “The Chicago School of Cybersecurity Thinking: A Pragmatic Mid-Western Look at Cybersecurity Risk and Regulation”
About the ECTF:
CECTF represents a diverse membership of over 600 public and private security professionals, academia representatives and law enforcement officials throughout Illinois, Wisconsin, and Northern Indiana. The United States Secret Service contributes to the CECTF by bringing together experts in an interactive environment. These professionals bring experience, knowledge, and resources to support electronic and financial crimes investigations, computer forensic examinations, and judicial testimony. Many members are investigators trained as responders to IT-related incidents, including network intrusion. The CECTF is dedicated to sharing knowledge of cutting-edge technologies, identifying cyber-based vulnerabilities, developing strategies to combat cyber and financial crimes, and the protection of our nation's critical financial infrastructure.
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
This presentation showcases the reasoning for and the importance of cyberseucrity in the not-for-profit sector. Case studies reinforce the importance of being ahead of the curve when managing cyber risk.
Be Angry - why CEOs should join the coalition against cyber crimeKevin Duffey
Phil Reitinger shares his experience as Director at the National Cyber Security Center, Microsoft, Sony and elsewhere, with over 100 CEOs and executives in London. Join the GCA to fight systemic cyber risks.
Expert Webcast Roundtable: Middle Market M&A and Private Equity Update 2017.
•Overview of macroeconomic trends
•Trends in M&A and private equity transactions
•Deal types and structures
•Domestic v. international deal space
•Role of M&A insurance
Expert Webcast: Mastering Transactional Due DiligenceExpert Webcast
Deal market overview
Due diligence areas of focus
Operational, financial, legal
Preparation and self-diligence
Data rooms and use of technology
VDRs
Best practices
Cyber Due Diligence
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
Blog post discussing why CISOs need to collaborate with privacy, legal, and product teams to effectively identify and mitigate risk in their organization.
Does your business have a disaster preparedness plan? This SlideShare will cover all considerations necessary to formulate a comprehensive plan following the NFPA 1600 Standards followed by the US Department of Homeland Security.
Cybis is a leading cybersecurity consulting firm providing Agency Grade® solutions to private sector clients. Our team is staffed by former operators from the NSA, CIA, and Department of Defense who have a cross-disciplinary expertise and help clients manage their business’s value at risk. As former offensive cybersecurity operators, we “think like an attacker” to determine where and how our clients are most likely to be targeted, and to craft strategies of defense and resilience to protect the business. Our approach integrates the technical, physical, and human dimensions of security to identify, prioritize and remediate complex risks, and vulnerabilities.
An analysis and discussion of the many factors to be considered when talking about data breaches.
What is a breach?
What are data?
What costs are we talking about?
Whose costs are we talking about?
How do we estimate costs / impact?
How do we measure / estimate frequency?
Presented at Source Boston, April 18, 2012, Boston, MA
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Cohesive Networks
Slides from Cohesive Networks' COO Dwight Koop at the April 2015 meeting of the Chicago Electronic Crimes Task Force, sponsored by Cohesive Networks and the United States Secret Service.
On April 30, 2015 Dwight Koop presented “The Chicago School of Cybersecurity Thinking: A Pragmatic Mid-Western Look at Cybersecurity Risk and Regulation”
About the ECTF:
CECTF represents a diverse membership of over 600 public and private security professionals, academia representatives and law enforcement officials throughout Illinois, Wisconsin, and Northern Indiana. The United States Secret Service contributes to the CECTF by bringing together experts in an interactive environment. These professionals bring experience, knowledge, and resources to support electronic and financial crimes investigations, computer forensic examinations, and judicial testimony. Many members are investigators trained as responders to IT-related incidents, including network intrusion. The CECTF is dedicated to sharing knowledge of cutting-edge technologies, identifying cyber-based vulnerabilities, developing strategies to combat cyber and financial crimes, and the protection of our nation's critical financial infrastructure.
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
This presentation showcases the reasoning for and the importance of cyberseucrity in the not-for-profit sector. Case studies reinforce the importance of being ahead of the curve when managing cyber risk.
Be Angry - why CEOs should join the coalition against cyber crimeKevin Duffey
Phil Reitinger shares his experience as Director at the National Cyber Security Center, Microsoft, Sony and elsewhere, with over 100 CEOs and executives in London. Join the GCA to fight systemic cyber risks.
Expert Webcast Roundtable: Middle Market M&A and Private Equity Update 2017.
•Overview of macroeconomic trends
•Trends in M&A and private equity transactions
•Deal types and structures
•Domestic v. international deal space
•Role of M&A insurance
Expert Webcast: Mastering Transactional Due DiligenceExpert Webcast
Deal market overview
Due diligence areas of focus
Operational, financial, legal
Preparation and self-diligence
Data rooms and use of technology
VDRs
Best practices
Cyber Due Diligence
Hemp market overview
•Legal and regulatory issues
•Investment opportunities – corporate and real estate
•Valuation trends
•Third-party due diligence
•Brand building and differentiation in the new industry
•Industry outlook
Understanding Claim History in M&A InsuranceExpert Webcast
Overview of M&A / Representations and Warranties Insurance
Payout history / frequent types of claims
Claim submission and processing
Role of a broker
Roles of external advisors – lawyers, accountants
Common issues
Transactional observations
July 13, 2017: Strategic Solutions to Cross-Border Business DisputesExpert Webcast
MAJOR TOPICS:
Structuring cross-border transactions
Dispute resolution: litigation, arbitration, other
Choice of law and venue
Enforcement
Treaties
Valuation issues
Cultural differences
Protection and ownership of IP
Forensic reviews and investigations
Cybersecurity concerns
MODERATOR:
Alex Kasdan, Senior Managing Director, DelMorgan & Co.
In a world of blurring lines and free-flowing data, the need for security technology is more keenly felt than ever. High profile breaches at companies like Target, JP Morgan and Sony – with more announced seemingly weekly – are regular reminders of the threats to data and digital assets. This, in turn, is driving high valuations and significant deal flow for innovative security technology firms. This Market Spotlight webcast will examine the specific technologies receiving the most interest, with perspectives from analysts, bankers, buyers, investors, and CEOs.
M&A Risk Allocation: Representations and Warranties InsuranceExpert Webcast
PANEL:
Craig Lilly, Partner, Baker McKenzie
Peter K. Rosen, Global Chair of the Insurance Coverage Litigation Practice, Latham & Watkins
Patrick Stroth, President, Rubicon M&A Insurance Services
Phil Casper, Principal, Euclid Transactional
Neil Morganbesser, President, DelMorgan & Co.
MODERATOR:
Alex Kasdan, Senior Managing Director, DelMorgan & Co.
MAJOR TOPICS:
Overview of common M&A deal risks
Representations and warranties insurance explained
Types and transactions covered
Reps & Warranties Insurance trends
Illustrative terms overview
Due diligence and underwriting process
Transaction timing and certainty of closing
Maximization of seller proceeds at closing
Claim history overview
M&A Risk Allocation: Representations and Warranties Insurance. Expert Webcast
PANEL:
Craig Lilly, Partner, Baker McKenzie
Peter K. Rosen, Global Chair of the Insurance Coverage Litigation Practice, Latham & Watkins
Patrick Stroth, President, Rubicon M&A Insurance Services
Phil Casper, Principal, Euclid Transactional
Neil Morganbesser, President, DelMorgan & Co.
MODERATOR:
Alex Kasdan, Senior Managing Director, DelMorgan & Co.
MAJOR TOPICS:
Overview of common M&A deal risks
Representations and warranties insurance explained
Types and transactions covered
Reps & Warranties Insurance trends
Illustrative terms overview
Due diligence and underwriting process
Transaction timing and certainty of closing
Maximization of seller proceeds at closing
Claim history overview
2014 Tech M&A Monthly - Myths, Misconceptions, & MisinformationCorum Group
In today's M&A market, it's not hard to find advice about how to sell a company. Unfortunately, a lot of it is wrong. And not simply wrong, but potentially damaging, not just to your M&A prospects but to your company's future. In the June edition of Tech M&A Monthly, join us as we take a look at why so much of the advice you're getting consists of myths, misconceptions and misinformation that put your company's value at risk.
Plus, news from the latest deals, a detailed look at how another of the Top Tech Trends, Information Security is driving transactions, plus the key deals, trends and valuations from the last month.
The panel of experts comprised of a senior corporate lawyer, an international tax expert, a litigator and arbitration expert, and senior investment bankers will discuss
the outlook, deal structures, financing and execution, as well as dispute prevention and resolution in Emerging Markets Cross-Border Transactions.
Major Topics:
The global outlook for cross-border investment and M&A activity in the emerging markets
Legal risks particular to investments in emerging markets; specifically in technology and natural resources
Types and indicia of risk
Transaction objectives and structures
Dispute resolution mechanisms
Economic risks particular to cross-border and emerging market investments
Raising capital for cross border investment and M&A: explaining the risks to potential investors
Successful deal execution
Cultural considerations
Case studies
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013Corum Group
June's Tech M&A Monthly webcast will examine two of the trends helping drive today's very hot tech M&A market. Debt is cheap and companies are taking advantage, including Apple's record $17B debt issue recently. We'll hear more about how this "megadebt" trend is shaping M&A.
Meanwhile, companies like Tumblr, Waze and Eloqua are commanding huge valuations, and buyers as varied as Yahoo, Facebook and Oracle are paying a premium when they have their sights set on an acquisition. What's driving these "hypervaluations" and how can you take advantage?
All this, plus our monthly look at the deals, trends and valuations across six software markets.
This panel discussion focused on the importance of understanding a company's legal and contractual obligations and the real world best practices for a business, based on what it does and who works there. The topic was presented by a panel of experts in the legal, insurance, and accounting services: Kegler Brown attorney David Wilson, Vice President of Marsh & McLennan Agency LLC Joe Woods, Director of Information Technology Services at GBQ Doug Davidson, and Director of Breach Response Services at Beazley Alex Ricardo.
07.19.2018 Understanding the Sell Side M&A Process for a Private CompanyExpert Webcast
Major Topics:
M&A market overview
Corporate and shareholder readiness
Assembling the deal team
Legal issues
Investment banking process
Types of buyers
Deal structures
Due diligence
Capitalizing on “hidden” assets – life insurance
Tax and other incentives available
M&A insurance
Wilson Consulting Group (WCG) is an innovative global cyber security consulting firm headquartered in Washington D.C., with a European office in London, England. We specialize in governance, risk, and compliance consulting services, providing our clients with strategic guidance, technical solutions, and business advice to best serve their individual needs.
State legalization of cannabis has created a robust marijuana and cannabis ancillary industries as well as significant need for growth capital for many new as well as established companies in the industry. Investment opportunities in the industry through public markets are still relatively scarce, and to meet the demand, venture capital firms, family offices and private equity funds have raised and are investing hundreds of millions of dollars into the industry. The panel will examine current trends and transactions in Cannabis, as well as growth and valuation trends, due diligence issues and potential risks and reward for private equity investors and companies seeking capital.
Expert Webcast: Lower Middle Market Finance for Owner OperatorsExpert Webcast
MAJOR TOPICS:
What is on the menu for owner/operator borrowers today?
Difference between a regulated bank and Debt Fund
Can owner/operators get financed like their PE owned competitors?
What is the optimal structure for a borrower with 4x-5x leverage? Uni’s vs senior/junior combination?
Does a dislocation in the broadly syndicated market affect this area?
How to prepare for a financing; Understanding the requirements to close/fund
Process breakdown – single points of failure
Lender point of view – why we like these financings
Understanding this is an arranged marriage and you have to live with one another – the relationship begins when the deal closes
Qualified Opportunity Zones rules seek to encourage investment and stimulate economic growth in certain distressed communities by providing various federal income tax benefits to taxpayers who invest in businesses that operate within these zones. Discussion will include tax incentives and key outstanding regulatory issues in Qualified Opportunity Zones as well as transactions for companies, funds and investors, including real estate deals and sales of closely held businesses.
• Intent of the 2017 legislation on Qualified Opportunity Zones
• Types of qualified opportunity funds
• Tax and business considerations in choosing a fund
• Tax benefits of investing in a qualified opportunity fund
• Capital gains that qualify
• Tax deferral or something more?
• Prescribed holding periods
• Taxpayer qualifications
• Investments required to realize tax benefits
• Investing in a sponsored fund to realize the tax benefits
• Forming a new fund
• Opportunity to defer gains for selling business owners
• Opportunity zones compared to a like-kind exchange for real estate investors
• A qualified fund in the case of a partnership dissolution
• Estate planning opportunities
• Opportunity Zones deal overview
• Real estate developer perspective -- cost of capital and deal structures
01.10.2019 Healthcare Restructuring Outlook 2019Expert Webcast
M&A Issues
Bankruptcy v. out-of-court restructuring
Drivers for filing
Provider agreement transfer issues
Regulatory and reimbursement issues
Unique financial aspects of healthcare receivables – collection and reimbursement
Not-for-profit business transfers
Rural and community hospitals
Realizing recovery to creditors
Public policy issues
Availability of financing
Issues for DIP lenders
D&O, malpractice and avoidance actions
08.09.2018 Tax Considerations in M&A for for Buyers and SellersExpert Webcast
•Tax affect on deal economics
•Specific tax considerations
•Target’s tax characteristics
•Form matters
•Stock sale v. asset sale
•Continuing equity interest
•Service agreements and non-competes
•Minority owner considerations
•Key employees
•State and local taxes
06.20.2018 Third Party Funding of Internatinonal ArbitrationExpert Webcast
MAJOR TOPICS:
Third party funding solutions
Appropriate situations for third party funding
Advantages and disadvantages
Finding the right funder and presenting the case
Case administration
Conflicts of interest, privilege, confidentiality and other issues
Regulatory issues
Buying and selling of claims
Insurance
05.31.2018 Resolving Shareholder and Investor DisputesExpert Webcast
MAJOR TOPICS:
Disclosure based settlements of shareholder litigation challenging merger transactions (Dead or Alive post Trulia)
Structuring Cash out mergers by majority or controlling shareholders (MFW)
Business Judgment Rule Review for Post- Closing Damages Cases (Corwin)
Developments in Appraisal Proceedings
WHAT BUSINESS OWNERS NEED TO KNOW ABOUT SUCCESSFULLY TRANSITIONING THEIR COMPANYExpert Webcast
Business readiness and shareholder personal planning
Corporate legal planning
Tax and estate planning
Wealth management considerations
Potential buyers and transaction structures
Preparing for due diligence – self-diligence, quality of earnings, other
Post-transactions planning
Issues to anticipate
02.15.2018 Trends, Transactions and Opportunities in Oil & GasExpert Webcast
MAJOR TOPICS:
Industry overview
Historical and anticipated M&A activity by sector
Transaction structures – SPACs, upstream M&A, joint ventures, other
Due diligence trends
Restructuring trends – in- and out-of-court
Asset consolidations
Dealing with legacy capital structures
Opportunities for strategic and financial investors
Outlook for the future
Managing Different Shareholder Constituencies in a Private Company Sale ProcessExpert Webcast
MAJOR TOPICS:
Bargaining power at inception
Shareholder, management and other agreements
Importance of process – legal and investment banking
Reconciling goals of controlling shareholders with minority
ESOP as a sale strategy
Non-ESOP shareholder and management considerations
California short-form squeeze-out merger
Preparing for potential shareholder litigation
Shareholders v. management tension
Gear slippage with strategic execution is a universal norm—but, it does not have to be
Limitations of the traditional Project Management Office (PMO)
Establishing ‘force multiplication’ for PE Operating Partners
Best practices for post-merger integration can be applied across the enterprise
Creating a “Culture of Execution” where managers embrace getting things done
Building healthier companies by teaching companies to execute rather than “taking over”
There is a better way: the ‘Change Management Acceleration Process’
Addressing a foreign insolvency in the U.S.
Overview of Chapter 15 Bankruptcy
Chapter 15 v. Chapter 11
UNCITRAL Model Law Adoption
Type of relief sought
Extraterritoriality and avoidance powers
Public policy implications
Approved guidelines for court communications
11.16.2017 Strategies for US Companies' Expansion AbroadExpert Webcast
Expansion structures: organic, mergers, acquisitions, joint ventures, other
Structuring private equity acquisitions abroad
Intellectual property and technology transfer issues
Understanding local infrastructure, language and culture
Staffing a deal team
Due diligence and disclosures
Dispute resolution mechanisms
Transfer pricing, tax structures and repatriation of capital
Financing availability
11.09.2017 Retail Trends and Forecasts for 2017 and BeyondExpert Webcast
MAJOR TOPICS:
Changing retail paradigm
Industry landscape overview
Technological disruptions
Traditional retail v. e-commerce
Maintaining growth and market share
New business models – experiential engagement
Healthy v. distressed
Overview of recent bankruptcy filings: Wet Seal, Payless ShoeSource, Toys-R-Us, other
Watchlist: Neiman Marcus, JCrew, Talbots, other
Restructuring alternatives
Outlook for the future
10.26.2017 Raising Capital for Emerging Growth CompaniesExpert Webcast
MAJOR TOPICS:
• Readiness for a capital raise
• Capital raising process
• Financial and business projections and valuation
• Debt v. equity
• Use of proceeds
• Assembling the right team of advisors
• Types of potential investors
• Common mistakes
10.19.2017 The State of Cross-Border Private Equity and the Role of Alternati...Expert Webcast
MAJOR TOPICS:
Overview of the private equity markets
Market and transactional trends in the US and Canadian private equity
Deal dynamics – structures, speed, execution
Resurgence in the IPO markets
Role of alternative capital pools in the deal economy
Industries and geographies
China cross-border investing
CFIUS process
PE to PE transactional trend
Increasing use of representations & warranties insurance
Value of advisors
Outlook for the future
09.28.2017 Alternative Investment Strategies - Life Insurance SettlementsExpert Webcast
Alternative Investment Strategies - Life Insurance Settlements
Major Topics of Discussion
Life settlements market overview
Seller’s v. buyer’s perspectives
Individual v. Corporate-owned policies
Life settlements as an alternative asset class
Transaction process and underwriting
Legal and regulatory framework
Due diligence
Tax implications
Servicing the assets
Overview of the risks
Valuation Trends and Investment Opportunities in the Cannabis IndustryExpert Webcast
MAJOR TOPICS:
Licensed medical use v. recreational use
Overview of State and Federal regulatory environment
Financing cannabis businesses – equity v. debt
Types of investors
Business valuation metrics
Most active market segments
Taxation of cannabis businesses
Industry banking solutions
Real estate infrastructure – medical-use cannabis cultivation and processing
Cannabis M&A
Forecasts under the Trump administration
5.25.2017 Getting Your Company Ready for SaleExpert Webcast
Moderator: Alexander B. Kasdan, Senior Managing Director, DelMorgan & Co.
Panel:
• C. Craig Lilly, Partner, Baker & McKenzie LLP
• Thomas N. Mahoney, CFA, CAIA, Private Wealth Advisor, Senior Portfolio Manager, UBS Private Wealth Management
• Greg Reber, Founder and CEO, AsTech Consulting
• Michael L. Evans, Northern California Managing Director, Newport Board Group LLC
MAJOR TOPICS:
• Corporate law imperatives
• Identifying high-risk areas pre-sale
• Avoiding contingent considerations post-sale
• Understanding seller motives and goals
• “Institutionalizing” the business
• Assembling the deal team
• Valuation Issues
• Sale process overview
• Potential transaction structures
• Understanding and managing cyber and technology risks
• Due diligence
• Wealth and estate planning for selling shareholders
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
This article provides a comprehensive guide on how to
effectively manage the convert Accpac to QuickBooks , with a particular focus on utilizing online accounting services to streamline the process.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
Explore the world of the Taurus zodiac sign. Learn about their stability, determination, and appreciation for beauty. Discover how Taureans' grounded nature and hardworking mindset define their unique personality.
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...Kumar Satyam
According to TechSci Research report, “India Orthopedic Devices Market -Industry Size, Share, Trends, Competition Forecast & Opportunities, 2030”, the India Orthopedic Devices Market stood at USD 1,280.54 Million in 2024 and is anticipated to grow with a CAGR of 7.84% in the forecast period, 2026-2030F. The India Orthopedic Devices Market is being driven by several factors. The most prominent ones include an increase in the elderly population, who are more prone to orthopedic conditions such as osteoporosis and arthritis. Moreover, the rise in sports injuries and road accidents are also contributing to the demand for orthopedic devices. Advances in technology and the introduction of innovative implants and prosthetics have further propelled the market growth. Additionally, government initiatives aimed at improving healthcare infrastructure and the increasing prevalence of lifestyle diseases have led to an upward trend in orthopedic surgeries, thereby fueling the market demand for these devices.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
2. 1
Expert Webcast is a sophisticated source of expertise for the
professional and the business communities locally, nationally and
cross-border.
Producing the industry’s leading webcast panels covering corporate,
M&A, restructuring and finance topics, Expert Webcast features
foremost experts in law accounting and finance, and addresses timely
and relevant issues faced by general counsel, C-level executives,
boards of directors, business owners and their advisors, as well as
institutional investors.
We welcome you to join our upcoming video webcasts or visit our on-
demand library to access recorded programs: www.expertwebcast.com.
3. 2
MODERATOR: Alexander B. Kasdan, Senior Managing Director,
DelMorgan & Co., brings more than twenty years of senior-level Wall Street
advice to middle market companies, entrepreneurs and institutional investors.
He has extensive experience in investment banking, corporate law and
restructuring at world’s leading firms, including Credit Suisse First Boston,
O’Sullivan Graev & Karabell LLP (now O'Melveny & Myers LLP), Battle
Fowler LLP (now Paul Hastings LLP) and Schlumberger Ltd., and as a
founding partner of Convergence Capital Partners. Alex has worked on more
than 100 domestic and cross-border transactions in North America, Europe and
Africa.
Alex is a Senior Advisor to Governance and Transactions LLC, an advisory firm
established in 2003 by Mr. James L. Gunderson, former Secretary and General
Counsel of Schlumberger Limited, to assist boards, management and owners
with corporate governance, compliance, structuring and strategic transactions.
Alex is a frequent moderator and an interviewer at Expert Webcast roundtable
discussions attracting business leaders and leading professionals from around
the world.
Alex graduated magna cum laude from Middlebury College with a B.A. degree
in Economics and Italian and was elected to Phi Beta Kappa during his junior
year. In addition, he holds a J.D. degree from Columbia University Law School
and has studied at the University of Florence in Italy.
100 Wilshire Blvd.
Suite 750
Santa Monica, CA 90401
+1 310 980 1718 mobile
+1 310 935 3826 office
ak@delmorganco.com
www.delmorganco.com
4. 3
Panelist: Mike Goldgof, Vice President, Marketing,
WhiteHat Security, brings over 20 years of executive
experience in marketing and product management to
WhiteHat where he is responsible for all marketing
activities.
His previous experience includes senior roles in
marketing, product management and business
development with information security, software and
telecom companies, including Juniper Networks, Hifn,
Phoenix Technologies and Lucent. At WhiteHat
Security, Mike is responsible for product messaging,
solutions content, sales enablement and go-to-market
strategies.
He holds an MBA in Marketing from Columbia
Business School and an MS in Electrical Engineering
from Cornell University.
Direct: +1.408.343.8393
Mobile: +1.650.799.7423
michael.goldgof@whitehatsec.com
www.whitehatsec.com
5. 4
Panelist: Greg Reber is the Founder and CEO of AsTech, a leading
information security consulting firm.
Since its founding in 1997, AsTech has established itself as a leading cyber
security risk management firm dedicated to helping organizations discover
and remediate vulnerabilities in their Internet applications, infrastructure
and critical systems.
AsTech has a well-established Mergers & Acquisitions (M&A) Technology
and Security Due Diligence practice offering either a Rapid Assessment,
covering key areas and identifying potential risks, or a Comprehensive
Assessment, involving greater in-depth analysis, testing and cost factors.
For customers of its Paragon Security Program, AsTech offers a warranty
of $5 million against damages from data breaches, making it the largest
monetary guarantee for cyber security products and services in the world.
Greg has an engineering degree from the University of Maryland and
started his career as an aerospace engineer, then subsequently served as
an international trade consultant in the aeronautical industry. He is a
member of a number of professional organizations including the Computer
Security Institute (CSI), Information Systems Audit and Control
Association (ISACA) and the Open Web Application Security Project
(OWASP).
700 Larkspur Landing Circle
Suite 199
Larkspur, CA 94939
T 415.291.9911
C 415.786.7857
greg.reber@astechconsulting.com
www.AstechConsulting.com
6. 5
Panelist: James M. Westerlind, Counsel at Arent Fox LLP, focuses on cyber
risk issues, including insurance coverage and potential data breach liability for
companies and their board members.
His practice also focuses on resolving insurance and reinsurance disputes,
including insurance and reinsurance coverage issues on behalf of policyholders
and carriers. James has also represented brokers, agents, and MGAs in disputes
with insurance and reinsurance carriers.
James has substantial litigation experience in both state and federal trial courts
within and outside of New York, representing plaintiffs and defendants in
insurance and noninsurance disputes. In addition to insurance litigation, he has
defended a number of prominent US companies in product liability actions. He
has also defended toxic tort cases. He has first-chaired applications for
emergency relief, evidentiary hearings for emergent relief, and contempt
hearings. He tried a major jury trial in the Southern District of Florida, obtaining
a jury verdict finding that a life insurance policy was valid and enforceable,
despite the jury finding that the trust that owned the policy made material
misrepresentations in the policy’s application and engaged in a civil conspiracy to
defraud the insurance company and engage in a stranger-originated life insurance
(STOLI) scheme.
James holds a J.D. from St. John’s University School of Law and a Bachelor’s
degree from State University of New York at Stony Brook.
1675 Broadway
New York New York 10019
212-457-5462
james.westerlind@arentfox.com
www.arentfox.com
7. 6
Panelist: Ben Collins, Director of Strategy and Product Marketing,
Intralinks.
As Director of Product Marketing, Mr. Collins is responsible for driving
the growth of IntraLinks’ Corporate Development platform, including the
company’s offerings for facilitating both buyside and sellside
transactions.
Prior to joining IntraLinks, Mr. Collins served as Director of Corporate
Development for Cognizant Technology Solutions, a leading global
provider of IT services solutions. While at Cognizant he was responsible
for evaluating and executing a variety of strategic initiatives, but was
primarily focused on driving growth through acquisitions.
Before Cognizant, Mr. Collins was a Vice President with Innovation
Advisors, a boutique investment bank focused on providing advisory
services for mergers and acquisitions in the technology industry. He also
worked at SG Cowen Securities in both their Corporate Finance and
Mergers & Acquisitions practices.
Mr. Collins graduated with honors from Harvard University with a B.A.
in Government.
404 Wyman St.
Suite 1000
Waltham, MA 02451
United States
T +1-617-357-3660
M +1-617-388-2999
bcollins@intralinks.com
www.intralinks.com
8. 7
MAJOR TOPICS:
• Information security and decision making
• Valuation issues
• Identifying industry-specific security issues
• Cyber due diligence
• Buy v. Sell side
• Potential post-transaction cyber liability
• Risk mitigation
• Preventative measures
• Crisis management
10. 9
LA / NY / SF / DC / arentfox.com
Expert Webcast:
Cybersecurity Issues in
M&A
Presented by: James M. Westerlind
Counsel, Arent Fox LLP
September 26, 2017
11. 10
Value of Cyber Insurance
• Provides coverage for risks not covered by
CGL.
• First- and third-party liability coverage.
• Breach response coverage.
• Cyber risk policies not uniform.
2
12. 11
Due Diligence for Buyer
• Comprehensive privacy and information due diligence
questionnaire.
• Data security policies and procedures.
• Vulnerability testing.
• Types of personal identifiable information stored/maintained.
• Types of insurance policies in force and limits.
• Identify vendors, and what access they have to confidential data and PII.
• Interview key officers and employees of seller.
• Including CISO.
• Review documents.
• Cybersecurity policies and procedures; vulnerability assessments; penetration tests;
vendor contracts; vendor audits; data incident reports; insurance policies (including
cyber insurance).
3
13. 12
Seller Reps & Warranties
• Tailored to the seller company’s industry and regulatory
environment.
• At minimum:
• Seller (and its vendors) are in compliance with its written data security
and privacy policies and procedures and applicable law.
• Seller (and its vendors) are in conformance with industry practice with
respect to data security. (May need specifics in certain industries).
• The seller’s data security policies are enforced by the company and
sufficient to reasonably ensure secure and proper access to the
seller’s systems and data.
4
14. 13
Vendor Risks
• Two-thirds of data breaches caused by third-party vendors.
Ponemon Institute.
• Target data breach – HVAC contractor.
• Review the seller’s vendor contracts.
• Sufficient confidentiality provisions?
• Obligation for vendor to promptly inform company where its confidential data is at all
times, and when and if it has been moved.
• Obligation of vendor to immediately notify company of any actual or suspected data
incident.
• Obligation of vendor to cooperate with company if a data incident occurs that may
involve the company’s confidential information.
• Ability for company to control the investigation of a data incident.
• Sufficient cyber insurance, with company named as an additional insured?
5
15. 14
Reps & Warranties Insurance Too
• Most cyber insurance policies exclude
reps & warranties made in an M&A
transaction.
• Purchase reps & warranties insurance
specifically tailored to the transaction.
6
16. 15
M&A Provisions in Policies
• Buyer’s Policies:
• Usually automatic coverage for acquired company if revenues above a
certain threshold for a period of time (60 days).
• Only covers claim occurring after acquisition, not before.
• Must notify insurer and pay extra premium to extend coverage
afterwards.
• Seller’s Policies:
• Only applies to claims that occur prior to date of transaction.
• Usually can be extended for claims made after transaction for prior
incidents. Must make seller notify insurers in advance; ask for
extended coverage and pay additional premium; and get endorsement
extending coverage.
7
17. 16
Preventative Measures for Cyber Risks
• Combined Legal and IT audits of company’s
IT system.
• Identify potential weaknesses.
• Protect audit, findings and recommendations as
privileged.
• Train management (including CEO) and
employees to avoid being victims.
• Using more sophisticated passwords a must.
8
18. 17
Danger to Small-to-Mid-Sized Companies
• 60% of the victims of cyber attacks in 2014
were small-to-mid-sized companies. 1/13/15
N.Y. Times Article: Entrepreneurship: No
Business Too Small to be Hacked.
• Smaller companies accept payment by credit
cards.
• Malware installed in retailer’s credit card
processing system to collect credit card
information – ATMs, gas pumps, groceries.
9
19. 18
Danger to Small-to-Mid-Sized Companies (cont’d)
• Employee personal information.
• Ransomware attacks on the rise.
• Smaller companies often don’t have as
sophisticated cyber security measures in
place as larger companies – easier prey.
10