Download Now!

visual
WHITE PAPER

White Paper: Mergers, Acquisitions and Divestitures

Wednesday November 23, 2022

visual

Synopsis:

The 2021 Fortune 500 CEO survey documents that two-third of the interviewed CEOs consider cybersecurity risk as their greatest concern. The implications of this rising source of risk are significant in the context of mergers and acquisition (M&A), as M&A transactions offer sophisticated cyber terrorists an opportunity to target the firms involved. The process of data migration and integration conducted in the immediate aftermath of the acquisition is complex, sensitive and exposes high-value data to potential cyberattacks, which is often further compounded by media coverage attracting the attention ofbad actors.

The industry has witnessed where the lack of good cybersecurity has a direct impact on M&A deals. In 2016, TalkTalk, a U.K.-based telecom business, was fined £400,000 when a threat actor accessed a customer database it acquired earlier was hacked. In 2017, the price of Verizon’s acquisition of Yahoo’s internet business plunged $350 million after Yahoo disclosed three massive data breaches compromising more than one billion customer accounts. And, companies exploring M&A today would be wise to consider a recent example from April 2020. A pending merger had 5% of its total purchase price set aside to cover the potential fallout from a ransomware attack. (Source: SecurityIntellignce)

As such, knowing what you are buying from a cybersecurity perspective, along with sustaining a good cybersecurity posture in your own business is becoming more critical from the deal price as well as understanding what level of historical risk you are buying or even selling.

Additional Resources

visual

Black & Veatch endorses Radiflow’s iSID

visual

Security Brief: Analysis of the Ukraine Cyber-Attack

visual

Securicon endorses the 3180 Security Gateway as a NERC CIP enabler

visual

New (EU) 2016/1148 Cybersecurity Directive

visual

Whitepaper: “Meet Your Attacker – Taxonomy & Analysis of a SCADA Attacker”

visual

Whitepaper: “Optimizing OT Security through Automatic Attacker Evaluation”

visual

Security Brief: The Norsk Hydro Cyberattack – Using AD in IT/OT Networks

visual

Security Brief: Fine-Tuning ICS Threat Models

visual

Radiflow joins SANS in producing the “2019 State of OT/ICS Cybersecurity” survey

visual

Report: KuppingerCole Executive View of SCADA Security by Radiflow

visual

Frost & Sullivan “Customer Value Leadership” Award & Analysis Report

visual

Report: Detecting Threats in a Simulated Water Facility at CISS 2019

visual

White Paper: Using Epidemic Models for Evaluating SCADA/ICS Risks

visual

Radiflow Insights: Attacks on Manufacturing: a Clear and Present Danger

visual

451 Research Reviews and Approves of Radiflow’s OT-MSSP Offering

visual

Security Brief: “A 2020 View of Industrial Cyber Security”

visual

Security Brief: Fear of Cyber-Retaliation by Iranian Attack Groups

visual

Conducting IEC-62443 Assessments Using Radiflow Products

visual

Security Brief “COVID19-Themed Malware and Cyber-Attacks – Overview & Protection Measures”

visual

Security Brief: “The Five Best Practices that will Protect Your OT/ICS Network in 2021″

visual

Breach & Attack Simulations (BAS) in OT environments

visual

White Paper: Risk Assessment & Management for Industrial Organizations

visual

Securing Railway Operations from OT Cyberattacks

visual

Data-driven approach to industrial cyber risk management – Cyber Risk Manangement eBook

visual

White Paper: InController – New State-Sponsored Cyber Attack Tools

visual

White Paper: Securing Pharmaceuticals from OT Cyber Attacks

visual

White Paper: OT Operating Model

visual

Safeguarding the Maritime Industry Through Advanced Cybersecurity

visual

NIS2 is Coming to OT Are you Ready?

visual

Securing OT Supply Chains

Request Demo Contact Us
Skip to content