Mergers can make a mess of security. Here are some suggestions for guiding your organization through the confusion Every deal has its own rhythm, energizing its executives into purposeful activity. But the dirtiest dance of all is an acquisition. It begins with a tentative waltz and grinds into a maniacal merengue. That’s when security has to cut in without disrupting the beat.During the past decade or so, I’ve been involved in several mergers and acquisitionssome worth billions of dollarsand I’ve made an observation: No matter how big the deal is, if it’s going to happen, it will happen fast. Keeping that in mind, I’ve come up with a security cheat sheet for abbreviated, yet meaningful, due diligence.1. Find out why you’re really buying the company.There are three reasons why these deals happen. Either you’re going to dismantle the company for its parts, assimilate it as a profit and loss center, or augment your organization by adding the company as a subsidiary. Knowing which path you’re on is the key to spending your time wisely. 2. Look for culture clash. If incompatible security styles become tangled, they can bring the party to a crashing halt. In my experience, that has been the biggest problem. Some of the characters that may require careful assimilation are: The ex-military, ex-intelligence types. Their hallmark is a pyramidal organization chart and well-documented processes. This is an ideal culture for companies looking to augment current security services. NT shops. Their security function is probably integrated into the IT department and layered on top of Windows. This group is a good candidate for dismantling, but like a cautious shopper, CSOs should thoroughly check out what they’re buying. It’s easy to force assimilation by appointing a new alpha male and thinning the herd, but this group is a weak choice for augmentation. Unix fanatics. Their slogan is: “If it’s documented, it’s not important; if it’s important, it’s not documented.” These types are lousy candidates for dismantling because they’ll fight every step of the way. Security teams that report to finance. Their primary function is to look flashy for upper management and to fast-talk their way through security problems. They are difficult to dismantle because they hide their problems. For companies looking to assimilate a target or augment their own company by adding a subsidiary, this group will work fine.3. Check the likeliest problem areas.Start by validating key assumptions made by the M&A team. If the other company is going to be dismantled, focus on the parts that you’re really buying. If they’re to be assimilated, probe across the breadth of the organization. If it’s an augmentation play, ask them for a briefing on their organization and then see whether they’ve portrayed themselves accurately. 4. Document your findings in a report. Keep it short. Avoid speculation, criticism and weaselly wording. While you’re writing it, think about how it might look as evidence in a lawsuit. Begin by restating the purpose of the acquisition, followed by a characterization of the other company’s security environment, the biggest problem area that you see and a short discussion of hidden benefits and possible pitfalls. Conclude with a recommendation of areas for deeper digging. 5. Close the loop with the target company.A little courtesy goes a long way. If you don’t contact them, no one else will. Don’t make any promises and avoid discussing any specific problems. But a simple phone call can earn you a lot of goodwill. Security is about choreographing a routine into a stylized art form. The dedicated CSO should not decline to dance nor blindly follow his partner’s lead. He should take a deep breath, move to the beat and keep the best interests of corporate security as his focusall of this while trying not to step on any toes. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe