Knowing the cyber risks in deals
Organisations are increasingly relying on third and fourth-party vendors and service providers to carry out day-to-day operations. As this trend grows, organisations must be sure to monitor third-party vendors and acquisition targets and perform a thorough due diligence review of all prospects in order to successfully protect against cyber threats and avoid liability for damages should sensitive information be compromised. Cyber due diligence is especially important in the case of mergers and acquisitions as it helps acquirers make better-informed decisions regarding cybersecurity and related responsibilities.
Cybersecurity due diligence is the process of identifying and remediating the cyber
risks of third-party vendors. This is often used to identify risks associated with potential targets for mergers
& acquisitions. When conducting due diligence, organisations should collect insights into a third-party vendors’
existing cybersecurity posture and IT security efforts. This way, the acquirer becomes aware of the cyber risks
and vulnerabilities they may be inheriting from the third-party.
Cybersecurity due diligence should also reveal any issues that might be considered deal-breakers, or that call
for a restructuring of the price and terms of the acquisition. An acquirer needs to not only identify, but quantify,
any issues so that the organisation can remediate them, or a system can be put in place to address the vulnerabilities
moving forward.
An acquirer should have a process to evaluate the current threat landscape and identify the bad actors – external and internal – that might target the parties in the transaction.
Threat landscape & bad actors
Frequency brings flexibility
Identify and quantify
Acquirers should first take a risk-based approach to cyber
due diligence in deals. As noted earlier, cyber due diligence isn’t as established nor does
it analyze standardized data as other types of due diligence. Since all deals aren’t the
same, they don’t require the same level of diligence.
An acquirer should have a process to evaluate the current threat landscape and identify the
bad actors – external and internal – that might target the parties in the transaction.
This landscape can vary by industry or region, and higher risk transactions – such as
acquisitions in certain countries or in sectors that have suffered recent attacks – require
greater diligence.
The more active a business is in deals – such as serial corporate
acquirers or private equity firms – the more cyber should be woven into the typical deal life
cycle. Frequent acquirers should have established relationships with cybersecurity stakeholders
within their firm and have a flexible cyber deals playbook to assist with cyber at each deal
stage, cyber risk level and deal type. This allows those acquirers to engage cybersecurity at
key points in a deal life cycle and to more effectively manage cyber risk to targets and their
existing portfolio.
Another outcome of managing cyber risk in deals is establishing a benchmark of cyber readiness,
which can be applied to other businesses in their portfolio and used when assessing new investments.
Some will conduct an annual security assessment of their portfolio companies, further preparing them for
future deals.
Cyber due diligence also should reveal deal-breakers – or more likely,
deal-changers – for the acquirer. Walking away altogether may be unlikely, but there may be issues that
lead a buyer to reconsider the target’s value – and therefore price. An acquirer needs to be able to
identify and quantify those issues and either push the target to address them before closing or renegotiate
the price and possibly other terms.
The latter could be an opportunity to shift seller proceeds to remediation investment, but the acquirer needs
to plan for how the issue will be addressed – and paid for – after closing and during integration. Still, the
potential to shift burden to sellers may appeal to serial acquirers who are making smaller deals and are
confident they can manage the risks.
Ultimately, successful cyber due diligence should yield not only a road map of critical remediation items but
also the responsibility for, cost of and timeline for resolving each item.
Knowing the cyber risks in deals
Taking action to limit cyber risks
Mechanisms that mitigate cyber risks