<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>due diligence - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/due-diligence-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/due-diligence-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 11 Dec 2023 14:03:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>due diligence - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/due-diligence-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity: an essential part of the Due Diligence</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/#respond</comments>
		
		<dc:creator><![CDATA[Florian Chabre]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 13:58:22 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Cyber risks]]></category>
		<category><![CDATA[due diligence]]></category>
		<category><![CDATA[M&A]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21900</guid>

					<description><![CDATA[<p>Confidential and strategic, the due diligence phase that precedes an acquisition regularly takes place behind closed doors. This phase aims to analyse the target company for an acquisition, in order to determine its level of maturity and compliance on various...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/">Cybersecurity: an essential part of the Due Diligence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Confidential and strategic, the due diligence phase that precedes an acquisition regularly takes place behind closed doors. This phase aims to analyse the target company for an acquisition, in order to determine its level of maturity and compliance on various aspects (strategic, legal, financial, accounting, etc.) and confirm the relevance of the operation.</p>
<p style="text-align: justify;">Acquisitions are an ideal time for attackers. With heterogeneous levels of security or uncontrolled interconnections, it becomes possible to attack the acquiring company by rebound, using the acquired company as a gateway.</p>
<p style="text-align: justify;">To manage these risks, <strong>cybersecurity must be a key factor</strong> in the success of acquisitions and mergers, <strong>from the due diligence phase</strong> onwards.</p>
<p> </p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-21978" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1.png" alt="" width="3409" height="1866" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1.png 3409w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-768x420.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-1536x841.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-2048x1121.png 2048w" sizes="(max-width: 3409px) 100vw, 3409px" /></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Variable </strong>cyber needs</h2>
<p style="text-align: justify;">Cyber due diligence can bring significant value to cyber, IT and business teams. The results can be used to support decision-making at several levels.</p>
<ol style="text-align: justify;">
<li><strong>Understanding the level of maturity of the target company:</strong> analysing security practices and identifying gaps in relation to the acquirer&#8217;s standards in order to understand the cyber risks incurred during the integration of the new IS.</li>
<li><strong>Test the level of security of a solution (mainly IT or Cyber): </strong>ensure security and resilience to confirm the value assessment (compliance with secure development practices, absence of critical vulnerabilities, preventive security measures, etc.).</li>
<li><strong>Estimate the cost of the integration:</strong> assess the cost of upgrading on the basis of the security debt and the charts to check the relevance of the operation and negotiate the acquisition price which absorbs the integration costs as far as possible.</li>
<li><strong>Assess reputational risks:</strong> ensure compliance with regulations, particularly on personal data, and the absence of intrusions that could damage the reputation of the acquirer after the transfer of ownership.</li>
</ol>
<p style="text-align: justify;">Cyber due diligence remains nonetheless a special exercise. The company under review (target) does not yet belong to the acquiring company, and the constraints imposed by the teams in charge of the operation or by business teams can be tough.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>A </strong>business context <strong>to take into account when choosing the cyber due diligence method</strong></h2>
<p style="text-align: justify;"><strong><u>On the acquirer&#8217;s side:</u></strong></p>
<ul style="text-align: justify;">
<li><strong>The budget:</strong> the choice of method is correlated to the availability of cyber security teams or a dedicated budget for calling in an external service. It is preferable to secure a contingency with the M&amp;A teams before any operation, to leave yourself a margin of choice.</li>
<li><strong>Time:</strong> business or competitive constraints can have an impact on the due diligence period. The choice of method depends fundamentally on the time given to the cyber teams to conduct their investigation.</li>
</ul>
<p style="text-align: justify;"><strong><u>On the identified company side: </u></strong></p>
<ul style="text-align: justify;">
<li><strong>Size:</strong> the due diligence method must be consistent with the size of the target company&#8217;s information system, the nature of its assets and the types of technology used.</li>
<li><strong>The &#8220;balance of power&#8221;:</strong> the difference in weight between the acquirer and the target company has a major influence on the possibility of conducting an in-depth and transparent cyber analysis (ability to obtain information, evidence, interviews, tests, etc.).</li>
<li><strong>The core business:</strong> the valuation must focus on what makes the identified company valuable, particularly when it comes to an IT product or know-how.</li>
</ul>
<p style="text-align: justify;">Based on these criteria, as well as existing processes, the cyber and M&amp;A teams work together to choose the method best suited to their needs and the situation.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Cyber due diligence for every operation</strong></h2>
<p style="text-align: justify;"><strong><u>Non-intrusive methods </u></strong></p>
<p style="text-align: justify;">The cybersecurity team may opt for non-intrusive due diligence methods when they have limited resources or when the target company is coveted by other potential acquirers.</p>
<p style="text-align: justify;">1) <strong>The security essentials questionnaire</strong> is used to measure the pre-identified company&#8217;s maturity in terms of the key areas. It has the advantage of being easy to deploy, without imposing a major burden on either the target company or the acquirer.</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>it is particularly well suited to assessing the cyber maturity of small companies (fewer than 50 employees). This questionnaire is to be defined by the cyber security teams in collaboration with the IT and M&amp;A teams.</em></li>
</ul>
<p style="text-align: justify;">2)<strong> &#8220;Automatic&#8221; cyber-scoring tools</strong> can be used to measure the level of security of assets exposed on the Internet. They have the advantage of providing security teams with an immediate view. Beware, however, that their results can be simplistic, as these tools only focus on the tip of the iceberg (what about partner management, cloud security, etc.).</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>we do not recommend prioritising their use in a cyber due diligence context, but they do have the advantage of providing a wealth of additional information quickly if your company has already subscribed to an offer.</em></li>
</ul>
<p style="text-align: justify;"><strong><u>In-depth methods</u></strong></p>
<p style="text-align: justify;">The cybersecurity team can opt for more in-depth due diligence methods when they have the human or financial resources and a &#8220;favourable balance of power&#8221; in the negotiation of the operation.</p>
<p style="text-align: justify;">1) <strong>The Due Diligence questionnaire, based on the acquirer&#8217;s internal cyber standards</strong>, is used to measure the target company&#8217;s level of maturity and to identify any deviations from its own policies and standards, an essential prerequisite for quantifying the potential cyber integration costs.</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>this is the most widely used method on the market, and enables us to prepare for the integration (integration scenario, cost scenario, planning, etc.). This questionnaire is to be defined by the cyber security teams in collaboration with the IT and M&amp;A teams.</em></li>
</ul>
<p style="text-align: justify;">2) <strong>Cyber assessment platforms</strong> (such as Cybervadis, Risk Ledger, CyberGRX…) can be used to assess the target company&#8217;s level of maturity in relation to benchmark security standards, and sometimes even to obtain upgrade action plans.</p>
<ul style="text-align: justify;">
<li><strong>Our conviction: </strong><em>the use of platforms is worthwhile if the target company is already registered/assessed. This also allows to pool resources with your &#8220;third party&#8221; approach (see RiskInsight article on third party management <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">here</a>). Otherwise, it often takes too long.</em></li>
</ul>
<p style="text-align: justify;">3) <strong>The technical audit</strong> provides an in-depth measurement of the level of exposure of a company or asset. Although penetration testing remains the most comprehensive audit, there are other types of tests that are easier to implement in a due diligence context (AD configuration scan, architecture audit, EDR report, report on penetration tests already carried out, etc.).</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>it is generally impossible to carry out tests before closing (the assets have not yet been purchased). In the absence of comprehensive tests, the free version of PingCastle provides a simple, accurate and rapid overview of the security level of Active Directories.</em></li>
</ul>
<p style="text-align: justify;">While Cyber Due Diligence is a necessary pre-requisite for all M&amp;A operations, it should serve as a leitmotiv for bringing together cybersecurity, M&amp;A, and IT teams to best guide companies in their transformation.</p>
<p style="text-align: justify;">Finally, there are situations in which Cyber Due Diligence could not be carried out (confidentiality, tight schedule, competitive pressure at the time of the operation, etc.). Cyber Due Diligence is often transformed into a 360° audit carried out post-signing/closing. This audit has a new objective: to help define the integration strategy.</p>
<p>&#8211;</p>
<p>We&#8217;d like to thank Arielle Attias for her contribution to the writing of this article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/">Cybersecurity: an essential part of the Due Diligence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>&#8220;Cyber&#8221; due diligence is the new asset for business valuation</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/04/cyber-due-diligence-business-valuation/</link>
		
		<dc:creator><![CDATA[Chadi Hantouche]]></dc:creator>
		<pubDate>Thu, 20 Apr 2017 07:50:23 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyberinsurance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[due diligence]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9742/</guid>

					<description><![CDATA[<p>Theoretically, when a company is for sale, its potential buyer carries out a preliminary investigation phase to ensure that the company, as advertised in its published documents, is the same in reality. This is otherwise known as due diligence. This...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/04/cyber-due-diligence-business-valuation/">&#8220;Cyber&#8221; due diligence is the new asset for business valuation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Theoretically, when a company is for sale, its potential buyer carries out a preliminary investigation phase to ensure that the company, as advertised in its published documents, is the same in reality. This is otherwise known as due diligence.</em></p>
<p>This can take different forms; the following aspects are usually examined:</p>
<ul>
<li><strong>Finance and accounting</strong> (auditing, personnel inventory, balance sheet and profit and loss accounts analysis, forecasted business activity, etc.)</li>
<li><strong>Legal</strong> (company statutes, proceedings in process, patent and intellectual property ownership&#8230;)</li>
<li><strong>Strategy</strong> (competitor identification, company strengths, distribution channels, etc.)</li>
</ul>
<p>Although current affairs and news offer plentiful examples of companies that have been impacted by cyberattacks, <strong>the issue of cybersecurity is all too often overlooked with regards to mergers and acquisitions</strong>.</p>
<p>But mindsets are evolving: in a recent survey conducted by Freshfields Bruckhaus Deringer, specialists in corporate law, 90% of respondents considered that a confirmed cyber-attack could lead to<strong> revise the acquisition cost downwards</strong>, and 83% of them thought that an attack during the due diligence phase could simply lead to abandon the deal.</p>
<p>Still, the cyber risk is real: as soon as two IT environments are interconnected, the resulting environment often inherits <em>de facto</em> the lowest level of security of the two. Besides, a merger or acquisition can highlight possible compliance gaps, in a context of increasing scrutiny by regulators all over the world.</p>
<h2></h2>
<h2>Is cyber-risk assessment the next pillar of M&amp;A?</h2>
<p>Increasingly aware of this risk, companies progressively integrate the notion of &#8220;cyber risk&#8221; into their reconciliation strategies. The objective is, in principle, simple: to understand whether the merger of two companies, and thus the likely merger of their Information Systems, increases cyber risk.</p>
<p>There is, however, a major difference between standard due diligence and its cybersecurity equivalent. While accounting and legal regulations are clearly understood and shared at the international level, there is as yet no equivalent in the cybersecurity world. <strong>Standards are multiplying</strong> (by system type, data to protect, industry, country&#8230;), <strong>but they only remain good practice references</strong> which indicate how to properly implement considerations around cybersecurity – not if they actually were implemented properly. There are some notable exceptions, such as PCI-DSS (protection of credit card data) certified environments, or classified, Defense-type environments. These examples, however, are specific, with very restricted scopes.</p>
<p>For the purchaser, acting in good faith and being unaware of security breaches will do nothing to prevent cyberattacks:<strong> in cyber risk, we not only endorse responsibility, but directly the risk itself!</strong></p>
<p>In the same manner, it is neither easy (yet, nor impossible) for a company to ensure that its cyber security is &#8220;good&#8221;. Managing the Information System in line with today’s best practices does not guarantee that its weaknesses will not be exploited tomorrow.</p>
<p>An M&amp;A context is not the only context of interest for examining the IS security aspects through cyber due diligence. For several years, large international insurers have launched their cyber-insurance offers. In this context, they legitimately seek to know the level of information security of companies for which they will provide insurance. At the minimum, insurers seek to know what general level of cyber-risk they will have to cover. Thus, by upstreaming this type of underwriting, cyber-insurers are now supported by IT security experts, whose role it is to carry out <em>due diligence</em> at a fairly high level.</p>
<p>&nbsp;</p>
<h2>What approach should be taken for cybersecurity due diligence ?</h2>
<p>What is security due diligence? <strong>It is neither an innovative technology nor a revolutionary method</strong>; rather it refers to the balanced and targeted use of different information security tools.</p>
<p>Several approaches are possible:</p>
<ul>
<li><strong>A &#8220;comprehensive&#8221; approach</strong>, consisting of both a theoretical and organizational analysis of security, supplemented by penetration tests to gain a vision as closely aligned to reality as possible. This approach, ideal in essence, is often used in the case of start-up buyouts. However, it is almost never used in larger deals, for reasons relating to both cost and a lack of time.</li>
<li><strong>An “interview” approach</strong>, which involves an evaluation of the situation in relation to a known and adapted reference framework during exchanges with security managers at the company in question. The limitation of this approach is that it is based only on statements and declarations. As such, it does not provide any proof of for what is being put forward. Led by a seasoned expert in this activity, this approach nonetheless facilitates a general view of the type of security practices that have been implemented.</li>
<li><strong>A “questionnaire” approach</strong> is offered as a matter of dealing with answers to a series of questions, usually with multiple choice answers. Beyond the lack of depth of such an approach, its outcome strongly depends on the respondents of the questionnaire, and the manner in which the questionnaire is used. Unfortunately, it is often the case that it is barely read or referenced.</li>
</ul>
<p>Irrespective of the chosen approach, it can be rolled-out at two stages: an initial analysis to <strong>provide knowledge and understanding of the security risks</strong>, which must feed directly into the “<strong>go / nogo</strong>” considerations behind the deal. A possible second step involves more detailed analysis for a more precise evaluation of risk(s) in order to <strong>determine the corrective actions</strong>.</p>
<p>&nbsp;</p>
<h2>Cyber due diligence as an input for valuation</h2>
<p>Whether it is for acquiring a company or assessing the risk taken by cyber insurers, due diligence must serve as a platform for encouraging further reflection on the<strong> feasibility of a deal</strong>.</p>
<p>It must also constitute an element of added value for the company, to the extent that conforming to and respecting market best practices can prove to be <strong>costly</strong>.</p>
<p>Finally, cyber due diligence helps to <strong>identify the regulatory aspects that must be respected</strong>, such as laws affecting Critical Information Infrastructures (USA PCII Program, China’s Cyber Security Law, France’s “LPM”, Singapore’s upcoming New Cybersecurity Act…) and which may require a certain number of adaptations foreseen on the Information System of the company for sale, and / or the purchaser.</p>
<p>Have we ever seen a cybersecurity due diligence lead to the abandonment of a company purchase? Not publicly. We rather witness the rapid correction of the most serious identified vulnerabilities, or sometimes a decision to not connect certain components of the Information Systems.</p>
<p>Will cybersecurity due diligence have any real impact on transactions? To this question, Verizon provided a response with a figure: in February 2017, the operator decreased its offer to purchase Yahoo by US$350 million. This corresponds to more than 7% of the value (US$4.8 billion) initially offered.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/04/cyber-due-diligence-business-valuation/">&#8220;Cyber&#8221; due diligence is the new asset for business valuation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
