11.04.2016 Views

Cyber Threats Targeting Mergers and Acquisitions

10sG0c

10sG0c

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Other historical cases <strong>and</strong> risks<br />

Further evidence of a company experiencing increased cyber risks during the M&A process was<br />

demonstrated during the Marriott Corporation acquisition of Starwood Group in 2015. On November<br />

16, 2015, the Marriott Corporation announced that it was to acquire the Starwood Hotels Group<br />

(including Sheraton, Westin, W, <strong>and</strong> Sheraton Four Points). On November 20, 2016, Starwood<br />

released a statement that it had been the victim of a point-of-sale malware breach. Third-party<br />

assessment of this acquisition questioned whether the Marriott Corporation had sufficiently probed<br />

this as a potential threat vector, as well as what impact the disclosure of this breach would have to<br />

Marriott.<br />

A note by Ernst & Young (EY) on the changes to IT infrastructure <strong>and</strong> processes resulting from<br />

mergers <strong>and</strong> acquisitions further highlights this type of risk. The note states that a proposed<br />

acquisition by a foreign organization had to be postponed indefinitely when it came under<br />

government scrutiny due to concerns that some of the software used by the acquiring company<br />

could expose the target company to “unacceptable cyber risks.” 2 This reinforces the concern that<br />

inherited infrastructure <strong>and</strong> software can represent a threat.<br />

Internal threats are another serious consideration for companies going through an M&A process.<br />

Reports have cited challenges to information security during M&A due to the perception by<br />

employees of an increased likelihood of redundancies or undesirable change. Employees are a<br />

demonstrable risk when disenfranchised. For example, on February 24, 2015 it was reported that<br />

an IT manager had used their access to an ex-employer’s servers to erase data (some of which was<br />

intellectual property). 3 Furthermore, a former employee of Gucci was charged for erasing data from<br />

<strong>and</strong> shutting down the servers of Gucci after having been fired.<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!