From the course: Managing Your Cybersecurity Program through a Merger or Acquisition
Schalten Sie den kompletten Kurs noch heute frei
Join today to access over 23,400 courses taught by industry experts.
Basic cybersecurity terms in M&A: Part 1
From the course: Managing Your Cybersecurity Program through a Merger or Acquisition
Basic cybersecurity terms in M&A: Part 1
- [Instructor] Now that we understand the end-to-end business process for mergers and acquisitions, we are almost ready to start discussing the importance of cybersecurity due diligence in these transactions and discover how it is performed. But for those viewers who are new to cybersecurity, let's cover the basic cybersecurity terms first so that you are prepared to understand the rest of the course. Due to the number of terms we need to cover, there are two videos on the basic cybersecurity terms and definitions. The first term is vulnerability assessment. Vulnerability is a gap or weakness in software, hardware, or business and technical processes or procedures that attackers are able to exploit if identified. Vulnerability assessment is the process of identifying these vulnerabilities within the enterprise's core systems and assets so that they can be addressed and closed, protecting the business against any…
Inhalt
-
-
-
Company strategies for accelerating business growth3m 3s
-
(Locked)
Different types of inorganic growth: Definitions4m 1s
-
(Locked)
Objectives of M&A2m 58s
-
(Locked)
End-to-end M&A business process: Pre-merger5m 11s
-
(Locked)
End-to-end M&A business process: Merger4m 51s
-
(Locked)
End-to-end M&A business process: Post-merger4m 22s
-
(Locked)
Basic cybersecurity terms in M&A: Part 13m
-
(Locked)
Basic cybersecurity terms in M&A: Part 23m 44s
-
-
-
-
-