11.04.2016 Views

Cyber Threats Targeting Mergers and Acquisitions

10sG0c

10sG0c

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of Contents<br />

Executive Summary ............................................................................................................. ..3<br />

1. Introduction ..................................................................................................................... ..4<br />

2. Associated threat actors................................................................................................. ..5<br />

FIN4...................................................................................................................................... ..5<br />

DarkHotel............................................................................................................................. ..5<br />

Other historical cases <strong>and</strong> risks.......................................................................................... ..6<br />

3. Steps of the Merger/Acquisition Process...................................................................... ..7<br />

Preparation for acquisition <strong>and</strong>/or valuation....................................................................... ..7<br />

Marketing.............................................................................................................................. ..9<br />

Due Diligence....................................................................................................................... ..9<br />

Negotiations, signing (<strong>and</strong> announcements)....................................................................... 10<br />

Waiting period <strong>and</strong> final merge............................................................................................ 10<br />

5. Conclusion........................................................................................................................ 11<br />

End notes.............................................................................................................................. 12<br />

Appendix 1: 10 Risk Considerations for <strong>Mergers</strong> <strong>and</strong> <strong>Acquisitions</strong>................................... 13<br />

2<br />

© All Rights Reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!