Cyber Due Diligence in M&As Uncovers Threats, Improves Valuations

Share:

To get the full picture, companies need to look into the cybersecurity history and practices of the business they’re acquiring.

Imagine getting ready to spend billions of dollars on an acquisition, only to find out that the target of the acquisition was the victim of multiple cyberattacks affecting billions of accounts. One would think such a scenario would be a huge red flag that no corporate board or general counsel would ever forget, regardless of the size of the acquisition, but that clarion call does not seem to be heard universally.

That’s what happened around the 2017 revelation of the massive breach of Yahoo uncovered by its sale to Verizon, and it cost the search engine company a $400 million hit to its purchase price. Apparently, however, cybersecurity and related technological components are still relatively low on the essential due diligence checklist.

The right time to start evaluating the cybersecurity risk profile of an acquisition target, experts agree, is early on in the due diligence process. Too often due diligence is limited to balance sheets, sales operations, and outstanding legal obligations, with cybersecurity, compliance, and technical compatibility of security tools left to the end of the discussion, if they are discussed at all.

“The value of pre-sign due diligence is to make sure that companies are assessing all the relevant risks before they sign on the dotted line,” says John Hauser, principal and cyber due diligence leader at Ernst & Young, as well as a former FBI special agent and a former assistant United States Attorney. “Cyber can be a major factor in deciding whether or not a client decides to walk away” from a merger or acquisition.

Early cyber due diligence allows a potential suitor to “negotiate better terms through the purchase price reductions, or indemnities, or other contractual provisions,” he adds.

In conjunction with the traditional business due diligence, companies are turning to threat intelligence experts to evaluate the prospective target’s risk profile, looking for evidence that the company might have been breached with data for sale on the Dark Web or perhaps has weak controls on other internal operations. Using open source intelligence (OSINT), he said, investigators often can find evidence of a breach, such as indicators of leaked credentials, communications between the target company infrastructure and any known malware families and command and control servers, or other insights.

Other significant intelligence can be gleaned by asking the target company to provide data such as attestations made to a cyber insurance provider, source code, penetration test results, and past compliance reports. “You’re starting to see more technical verification, moving into the pre-sign phase,” Hauser says.

Assessing Vulnerabilities

Cyber criminals often watch mergers and acquisitions activity, looking for a potentially weak target being acquired by a stronger company, especially one that might have a lot of valuable information for the cybercrooks, notes Heather Clauson Haughian, founder and managing partner at the Atlanta-based law firm Culhane Meadows. Once the acquisition goes through, it would not be uncommon for the target firm to get attacked with the hopes of breaching a weak link and thus accessing the more lucrative part of the merged companies.

Another vulnerability occurs when organizations with differing compliance requirements join, Haughian says. While the acquiring organization might be well versed in its own compliance reporting requirements, it might not have the same expertise with the company it acquires.

If the acquiring company does not employ compliance experts for the acquired company’s operations, there could be a gap in compliance reporting, along with missed opportunities to layer security controls over the acquired company, leaving it vulnerable to a cyberattack, she says.

In such cases, using a third-party advisory service is recommended, says Shay Colson, managing partner of cyber diligence at Bellingham, Washington-based firm Coastal Cyber Risk Advisors. A company executing a bolt-on, add-on, or tuck-in acquisition can have its third-party adviser evaluate the target’s security posture, including what its program looks like, strengths and weaknesses, and existing security tool sets. “Then you can get views on the targets that are both objective to the target and deal with this integration challenge,” he says.

Taking Responsibility

Ultimately, general counsels need to come up to speed as quickly as possible on cyber risk and cybersecurity. “They are going to be the ones who own cyber risk at their enterprise because if there’s an incident, they’re calling outside counsel, they’re coordinating forensics, and they’re looking at regulatory response obligations,” Colson says.

“I think the more proactive [general counsels] are, [they are] going to realize that cyber risk is a place where they can actually drive value to the business and enable things,” he adds. “It’s just a matter of time before more and more GCs get on board with that.”

EY’s Hauser said that SEC Chairman Gary Gensler’s recent proposed rules for public companies and other financial services organizations could help boards of directors to navigate through the cybersecurity due diligence challenges.

There is a consensus that there is a growing risk of cybercrimes and that boards need to pay greater attention to it, he said. Courts and regulators are making it explicitly clear that failing to do proper cyber due diligence makes it easier for a future plaintiff to accuse a board member of negligence. That, combined with Gensler’s proposed rules that put more personal responsibility on C-suites and board members, and you have the perfect storm for cybersecurity experts to take a more active role in board-level decisions, he notes.

https://www.darkreading.com/edge-articles/cyber-due-diligence-in-m-as-uncovers-threats-improves-valuations

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
11:49 pm, Jul 11, 2025
weather icon 23°C
L: 21° | H: 23°
clear sky
Humidity: 64 %
Pressure: 1018 mb
Wind: 6 mph ESE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 1%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:56 am
Sunset: 9:15 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
21° | 23°°C 0 mm 0% 10 mph 65 % 1018 mb 0 mm/h
Sun Jul 13 10:00 pm
weather icon
17° | 29°°C 0 mm 0% 7 mph 66 % 1015 mb 0 mm/h
Mon Jul 14 10:00 pm
weather icon
19° | 28°°C 0 mm 0% 14 mph 71 % 1017 mb 0 mm/h
Tue Jul 15 10:00 pm
weather icon
15° | 25°°C 0 mm 0% 13 mph 68 % 1020 mb 0 mm/h
Wed Jul 16 10:00 pm
weather icon
18° | 25°°C 1 mm 100% 13 mph 83 % 1019 mb 0 mm/h
Tomorrow 1:00 am
weather icon
20° | 23°°C 0 mm 0% 3 mph 64 % 1018 mb 0 mm/h
Tomorrow 4:00 am
weather icon
17° | 21°°C 0 mm 0% 4 mph 63 % 1018 mb 0 mm/h
Tomorrow 7:00 am
weather icon
19° | 20°°C 0 mm 0% 5 mph 65 % 1018 mb 0 mm/h
Tomorrow 10:00 am
weather icon
26° | 26°°C 0 mm 0% 6 mph 44 % 1017 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
29° | 29°°C 0 mm 0% 6 mph 32 % 1016 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
29° | 29°°C 0 mm 0% 10 mph 30 % 1014 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
25° | 25°°C 0 mm 0% 9 mph 41 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
21° | 21°°C 0 mm 0% 6 mph 55 % 1015 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€100,562.39
1.41%
Ethereum(ETH)
€2,516.93
-0.71%
Tether(USDT)
€0.86
0.03%
XRP(XRP)
€2.30
6.14%
Solana(SOL)
€138.13
-1.79%
USDC(USDC)
€0.86
0.01%
Dogecoin(DOGE)
€0.169957
3.15%
Shiba Inu(SHIB)
€0.000011
0.07%
Pepe(PEPE)
€0.000010
1.21%
Peanut the Squirrel(PNUT)
€0.246234
7.19%
Scroll to Top