01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

may have a material impact on the value of a company. Additionally, the company may be<br />

financially, civilly, and legally liable if the SEC has not been notified of the material breach.<br />

7. Is the company at risk of insider threat from disgruntled employees offering company data or<br />

services on the dark web?<br />

8. Has the M&A entity or its supply chain been breached, or is a breach likely, which could result in<br />

leaked details about their M&A activities on the dark web?<br />

Organizations that purchase or merge with another entity inherit cybersecurity risks. Un<strong>for</strong>tunately, many<br />

companies do not conduct adequate cyber risk assessments to determine if a potential acquisition has<br />

been breached or if there are precursors of a breach available to the threat actor to breach the company<br />

if they elect to. This lack of exploration can increase the risks of inheriting compromised companies and<br />

their networks. In the fast-paced world of M&A, it can be increasingly more work to control cybersecurity<br />

risks. At the same time, in<strong>for</strong>mation security departments may need more personnel and resources to<br />

mitigate discovered cyber threats.<br />

Many factors impact a company’s stock price. Without polling investors, it is unclear whether a stock's<br />

decline after a breach disclosure is due to correlation or causation. <strong>The</strong> Starwood breach was a<br />

significant unknown breach that existed be<strong>for</strong>e and after its purchase by Marriott. On the day Marriott<br />

announced the breach, its stock dropped 2%. In the ten trading days after the announcement, its stock<br />

dropped 16%. In the thirty days after the announcement, it dipped 25%. It was 89 days from the date<br />

the breach was announced and Marriott’s lowest close <strong>for</strong> the year, with a stock price drop of 46%.<br />

During the M&A process, external consultants are often involved, depending on the deal's specifics.<br />

<strong>The</strong>se consultants typically include investment banks, buying and selling agents, lawyers, auditors, etc.<br />

However, it is increasingly common to include CTI vendors as well. <strong>The</strong>se vendors assess the security<br />

status of the company being considered <strong>for</strong> the deal and determine if there has been any breach or theft<br />

of valuable items by a known or unknown third party. This in<strong>for</strong>mation is crucial as it can significantly<br />

impact the sale.<br />

It is about more than just evaluating the M&A company. Threat actors more frequently target M&A<br />

organizations than typical businesses. Higher-end threat actors use proven and profitable business<br />

models such as industrial espionage and stock market manipulation, making breaching an M&A company<br />

very profitable. <strong>The</strong>re<strong>for</strong>e, M&A entities can benefit from CTI monitoring, such as what Resecurity offers,<br />

to safeguard themselves and the other entities involved in M&A activities. Additionally, it is essential to<br />

protect the confidential in<strong>for</strong>mation the seller provides, as any leak could result in a seller's SEC rule 7<br />

disclosure.<br />

CTI <strong>for</strong> M&A<br />

It is common <strong>for</strong> M&A companies to do CTI analysis during the M&A process. Most M&A companies<br />

outsource various aspects of determining the company’s cybersecurity posture to other companies,<br />

including a perimeter scan of the company’s network, scans of low-end cybercrime <strong>for</strong>ums (TOR), and a<br />

review of the company’s source code. However, external threat intelligence can enhance this vetting by<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!