4 MINS READ
M&A executives view cyber threats as specifically focused, pre-meditated attacks by a bad operator towards a buying or selling company, or both, with an explicit goal.
As soon as an M&A deal is made public, hackers start testing the security perimeters and wait till “chinks in the armor” are revealed. During Day 1 and post-merger integration, cyber vulnerability heightens, as employees increase their activity over the network and infrastructure to ensure the operational success of the deal. Bad actors use technologically sophisticated approaches and deepfake identity theft to access confidential personal and financial information, proprietary IP, new product schematics – all of which can be sold on the virtually untraceable dark web.
Fraudsters may encrypt servers through malware and lock them in for ransom or may co-opt the use of the buyer or seller’s network storage, bandwidth, and computing resources to carry out illegal activities.
While during integration the overall security perimeter of the combining entities shifts, creating potential gaps for unauthorized entry, the greatest compromises come from undocumented “backdoors” such as an unpatched system, a networked legacy device, or even a forgotten or unmonitored web portal.
Supply chain management is another area prone to cyberattacks as it involves tens of thousands of system interfaces internally and externally. Each system interface potentially offers intruders an opportunity to disrupt or illegally gain from the misuse of the buyer’s and/or the seller’s data, intellectual property, payments, and more.
Buy-side diligence includes quick identification of issues that hamper a successful M&A deal.
Before the deal is agreed, the buyer formulates a basic mitigation strategy and estimates investment required to alleviate cyber security issues, if and when they arise. Deal success, therefore, requires understanding of:
Benchmark the practices of the seller against their competitors to determine the target acquisition’s degree of above- or below average risk from both technical and non-technical factors.
People: Assess not only the management of the IT and cyber systems but also the importance, and availability of support for IT security by the organization’s leadership, employees, and third parties.
Process: Review policies and procedures in place for data integrity maintenance and information stewardship. This includes governance of regulatory and compliance standards to fulfill all auditing and reporting obligations.
Sell-side diligence requires identifying issues that could prevent a deal or negatively impact the sale price before a deal is negotiated. Successful sellers either resolve issues beforehand or optimally build their cyber security remediation into a detailed transition plan and pricing.
Strategic priorities for the buyer’s and the seller’s c-suite are fivefold.
Anticipating and pre-empting threats is half the battle won in a cyber risk mitigation strategy.
A good cyber security plan for any acquisition, merger, or divestiture is both strategic and highly tactical to address the unique and dynamic nature of the transaction.
The M&A landscape is even more complex as cyber threats evolve due to the increasing sophistication of criminal tactics and tools available to enable them. The resultant damages are financial, operational, and reputational.
M&A transactions almost always include the purchase or sale of data, and the plan to realize the targeted synergies and investment returns is only as sound as the cyber security in place before, during, and after the deal. Including digital security as a deal-driven priority is the only way to ensure a smooth, stable, and value-added M&A business exchange.
Anticipating and pre-empting threats is half the battle won in a cyber risk mitigation strategy.
According to Gartner, by 2022, 60% of enterprises engaging in M&A will consider cyber security posture as a critical factor in their due diligence process.