11.04.2016 Views

Cyber Threats Targeting Mergers and Acquisitions

10sG0c

10sG0c

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Executive Summary<br />

Global merger <strong>and</strong> acquisition (M&A) activity reached record-breaking deal values in 2015 at<br />

over $4 trillion, with the resulting deals expected to add $1.5 to $1.9 trillion in value to these<br />

companies. 1 In 2016, high levels of activity are expected to continue.<br />

While mergers <strong>and</strong> acquisitions propel companies forward, the M&A process also fuels<br />

significant opportunities for cyber criminals. Failure to secure sensitive information during<br />

this time opens the door to threat actors looking to profit by exploiting financial markets <strong>and</strong><br />

proprietary intellectual property (IP). Given the value to be gained once the companies are<br />

combined, it’s safe to say that ensuring successful integrations will be a priority on boardroom<br />

agendas. Security, both during the M&A process <strong>and</strong> after the deal is closed, will play a central<br />

role in positive outcomes.<br />

In this report, Digital Shadows examines cyber risks or possible degradation to a company’s<br />

security posture as a result of the M&A process. The report takes historical cases of threat<br />

actors <strong>and</strong> applies other likely threats across the five-stages that companies typically go<br />

through during a merger or acquisition. Along each stage new risks emerge <strong>and</strong> advanced<br />

attackers, well-versed in corporate espionage techniques, st<strong>and</strong> to profit. Individuals’ behaviors,<br />

unintentional clues <strong>and</strong> vulnerabilities in inherited network infrastructure <strong>and</strong> software can all<br />

present risk. However, organizations armed with these insights can better underst<strong>and</strong> the threats<br />

they face <strong>and</strong> mitigate accordingly.<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!