Cyber Threats Targeting Mergers and Acquisitions

...

Download Global merger and acquisition activity reached record-breaking deal values in 2015 at over $4 trillion. These high levels of activity are expected to continue, making it all the more important to secure sensitive information. Failure to do so opens the door to threat actors looking to profit by exploiting financial markets and proprietary intellectual property.

This paper examines:
- Cyber risks or possible degradation to a company's security posture due to the M&A process
- Historical cases of threat actors
- Likely threats across the five-stages that companies typically go through during a merger or acquisition
- How to better understand the threats faced with M&A and how to mitigate accordingly

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Weekly Rewind: Massive Prius recall, Note 7 woes get worse, and more

    In a statement, Samsung said it’s, “putting consumer safety as top priority,” and, “reached a final decision to halt production of the Galaxy Note 7.” At this time, the Galaxy Note 7 isn’t being produced, isn’t being sold, and those that do remain aren’t being exchanged for another unit.
  • 5300c769af79e

    Microsoft's Intolerable Windows 10 Aggression

    A slice of the Microsoft marketplace wants to move to Windows 10.That would have been the right way for the company to make the transition to Windows 10.
  • 5300c769af79e

    Lenovo Announces First Project Tango Phone, the Massive PHAB 2 Pro

    As the name suggest, it’s a massive phone, but it also has four cameras, a metal unibody, and almost everything else you could ask for in a flagship.As for quick specs, you are looking at a 6.
  • 5300c769af79e

    Article Boards - Latest Message Boards

    View Content By Month blog boardsreader boardsstart a boardsearch > >> IBM's Strategy Fails To Boost Revenue, Impress Investors White House Petition Aims To Stop The Javascript Scourge Apple Gave Up User Data In 82% Of Feds' Requests 10 Cloud Jobs In Highest Demand Now Amazon Echo: A Rising Rock Star?Malware Attacks More Frequent, Harder To Fight Apple, FBI Encryption Debate Continues At Congressional Hearing EU Slaps Google With Android Antitrust Charges 9 Cloud Services To Keep You Productive At Interop IT Pros Fear Encryption Backdoors Microsoft Gains In SaaS Market, Report Finds Insider Security Threats: Disloyal Employees 10 Top Tech Companies Poised For Massive Layoffs Skype Bots Now Reach Mac And Web "How To Hire A Hacker" "10 Best And Worst Cellphones Of All Time" Intel Slashes 12,000 Jobs, Shifts Focus To Cloud, IoT IBM Watson: 10 New Jobs For Cognitive Computing Making Mainframes Cool Again Apple Kills QuickTime For Windows, Adobe Issues Warning MacBook Line Gets Faster Chips, Battery Boost Drones Banned At Boston Marathon, Blamed For British Airways Hit Cloud Stampede Is On, But Who's Watching Security?