From the course: Managing Your Cybersecurity Program through a Merger or Acquisition

Schalten Sie den kompletten Kurs noch heute frei

Join today to access over 23,400 courses taught by industry experts.

Basic cybersecurity terms in M&A: Part 2

Basic cybersecurity terms in M&A: Part 2

"

- [Instructor] Hi, and welcome back to the second video on basic cybersecurity terms. The next term is system or network configuration review, which involves reviewing deployed configurations to ensure they are done correctly and consistently across organization for all its systems or network. This helps identify gaps and the level of work needed to ensure that systems and network are secure and compliant if the two organizations were to be combined. Next term is compromise assessment, which helps identify and address any enterprise-wide security breaches or compromises, and determines the level of impact the breach may have on the company's operations. It also helps identify if any networks or systems are already compromised. All this information helps the M&A team of the buying company identify if the deal will be worth it or not, and helps negotiate any necessary provisions in M&A agreements related to the security of…

Inhalt