From the course: Managing Your Cybersecurity Program through a Merger or Acquisition
Schalten Sie den kompletten Kurs noch heute frei
Join today to access over 23,400 courses taught by industry experts.
Performing compromise assessment
From the course: Managing Your Cybersecurity Program through a Merger or Acquisition
Performing compromise assessment
- [Instructor] During the mergers and acquisition process, it is important to know about any past or ongoing cybersecurity incidents or data breaches on the target company. This will help the buyer company make the final decision on the deal and negotiate the right price point. In this video, we will be discussing the fourth step of cybersecurity due diligence, which is to perform the Compromise Assessment. The first step in the Compromise Assessment is to identify any past or ongoing cyber incidents or data breaches the company has experienced. This can be done by looking at incident reports, interviewing the target company's IT or information security employees, or by conducting external research, which typically involves collecting, analyzing, and correlating data from various external resources to gain a comprehensive view of potential security breaches and ongoing threats. With that information, the organization can…
Inhalt
-
-
-
-
-
-
(Locked)
Cybersecurity M&A due diligence framework37s
-
(Locked)
Preparing InfoSec insurance3m 14s
-
(Locked)
Engaging third-party assessors4m 7s
-
(Locked)
Discovery and workflows to identify key assets and risks4m 50s
-
(Locked)
Performing compromise assessment2m 27s
-
(Locked)
Risk management: Comprehensive risk assessments and risk response5m 32s
-
(Locked)
Communicating risks to the M&A team4m 52s
-
(Locked)
M&A gone wrong: Case study and learnings1m 27s
-
(Locked)
-