Cyber Threats Targeting Mergers and Acquisitions
10sG0c
10sG0c
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Table of Contents<br />
Executive Summary ............................................................................................................. ..3<br />
1. Introduction ..................................................................................................................... ..4<br />
2. Associated threat actors................................................................................................. ..5<br />
FIN4...................................................................................................................................... ..5<br />
DarkHotel............................................................................................................................. ..5<br />
Other historical cases <strong>and</strong> risks.......................................................................................... ..6<br />
3. Steps of the Merger/Acquisition Process...................................................................... ..7<br />
Preparation for acquisition <strong>and</strong>/or valuation....................................................................... ..7<br />
Marketing.............................................................................................................................. ..9<br />
Due Diligence....................................................................................................................... ..9<br />
Negotiations, signing (<strong>and</strong> announcements)....................................................................... 10<br />
Waiting period <strong>and</strong> final merge............................................................................................ 10<br />
5. Conclusion........................................................................................................................ 11<br />
End notes.............................................................................................................................. 12<br />
Appendix 1: 10 Risk Considerations for <strong>Mergers</strong> <strong>and</strong> <strong>Acquisitions</strong>................................... 13<br />
2<br />
© All Rights Reserved