From the course: Managing Your Cybersecurity Program through a Merger or Acquisition
Schalten Sie den kompletten Kurs noch heute frei
Join today to access over 23,400 courses taught by industry experts.
Basic cybersecurity terms in M&A: Part 2
From the course: Managing Your Cybersecurity Program through a Merger or Acquisition
Basic cybersecurity terms in M&A: Part 2
- [Instructor] Hi, and welcome back to the second video on basic cybersecurity terms. The next term is system or network configuration review, which involves reviewing deployed configurations to ensure they are done correctly and consistently across organization for all its systems or network. This helps identify gaps and the level of work needed to ensure that systems and network are secure and compliant if the two organizations were to be combined. Next term is compromise assessment, which helps identify and address any enterprise-wide security breaches or compromises, and determines the level of impact the breach may have on the company's operations. It also helps identify if any networks or systems are already compromised. All this information helps the M&A team of the buying company identify if the deal will be worth it or not, and helps negotiate any necessary provisions in M&A agreements related to the security of…
Inhalt
-
-
-
Company strategies for accelerating business growth3m 3s
-
(Locked)
Different types of inorganic growth: Definitions4m 1s
-
(Locked)
Objectives of M&A2m 58s
-
(Locked)
End-to-end M&A business process: Pre-merger5m 11s
-
(Locked)
End-to-end M&A business process: Merger4m 51s
-
(Locked)
End-to-end M&A business process: Post-merger4m 22s
-
(Locked)
Basic cybersecurity terms in M&A: Part 13m
-
(Locked)
Basic cybersecurity terms in M&A: Part 23m 44s
-
-
-
-
-