Tag: Policy Gap Analysis
-
How secure is the transaction? Can unauthorized users gain access to protected information? Are new threats introduced by the current threat posture as a result of this merger or acquisition?
Step 1: Conduct a Policy Gap Analysis As you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions (M&A), keep in mind that the networks of companies going through an M&A can be subject to cyberattack. As you work through this step and the others, keep these questions in mind:…