Cyber Security Practitioner
Back to Contents

Volume: 3 Issue: 4
(April 2017)

guide framing cyber security due diligence m& transactions corporate network breach lasting consequences companys customers existing stakeholders future


Share This Page

A guide to framing cyber security due diligence in M&A transactions

A corporate network breach can have lasting consequences not only for the company’s customers and existing stakeholders, but also for its future acquirers and successors. The reason even a single cyber security incident can be material is by now well understood, and a constant focus of shareholders, boards, lawmakers, regulators, consumer data breach victims, and even international standard setting bodies. Simply put, today’s market leaders across nearly every sector of industry have made their mark through the rapid adoption of technology, coupled with the broad collection, use, and sale of all sorts of data, and lots of it. It comes to follow that today’s mergers and acquisitions (‘M&A’) are saddled with business and legal considerations involving privacy and cyber security that simply did not exist 20 years ago. These considerations are particularly acute for transactions that involve companies with large quantities of sensitive personal data, or whose value materially relies upon the protection of trade secrets; or, in relation to the networks themselves rather than the data that resides on them, companies that operate critical systems or manufacture devices that require high process integrity and guaranteed levels of service availability. Steven R. Chabinsky, Kevin L. Petrasic and Helen Y. Lee of White & Case LLP, provide a detailed breakdown of cyber security due diligence for M&A transactions.

Sign up for a free trial for a week’s access to the entire latest issue of the journal
You must be logged in and have an active full subscription to view full articles.
Log in now
If you are not already a subscriber, take a subscription for full access to our entire online archives.

Search Publication Archives

Our publication archives contain all of our articles.
Can’t find what you are looking for?
Try an Advanced Search

Log in to cyber security practitioner
Subscribe to cyber security practitioner
Register for a Free Trial to cyber security practitioner
cyber security practitioner Pricing

Social Media

Follow cyber security practitioner on TwitterView cyber security practitioner LinkedIn Profilecyber security practitioner RSS Feed