11.04.2016 Views

Cyber Threats Targeting Mergers and Acquisitions

10sG0c

10sG0c

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1. Introduction<br />

<strong>Mergers</strong> <strong>and</strong> acquisitions can be exciting, but they are also marked by hectic, stressful <strong>and</strong><br />

frustrating periods. Vigilance is required at all stages throughout the M&A process, as a failure to<br />

secure sensitive information constitutes both a threat to the organization <strong>and</strong> an opportunity for<br />

threat actors. Over the past several years, there have been notable examples of organizations facing<br />

cyber threats as a result of vulnerabilities that have emerged while going through a merger or<br />

acquisition. But what can organizations do about this? By underst<strong>and</strong>ing both how <strong>and</strong> at what stage<br />

of the M&A process these threats occur organizations can mitigate them.<br />

4 Any additional information can go here as a part of the footer<br />

(Edit the C-Master to update this text)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!