What residual risk to the target company’s assets and IP remain

What residual risk to the target company’s assets and IP remain

You need to identify what streaming the companies are doing and the specific technology they are leveraging.

What are the technical vulnerabilities associated with the protocols involved?

Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced somewhat, shifted to a third party, etc.)?

What residual risk to the target company’s assets and IP remain?

Would those risks extend to the current (takeover) company after the merger?
a. Would that be bad enough to cancel the M&A?

If the response to #5 is yes, then, what should the target company do to further mitigate the risk? How should the takeover company mitigate the risk?

What are the costs associated to the target company (implementing the appropriate

instructions_3 (1)

Solution preview

The policy gap analysis is the logical outline of the provision system security supported by the companies before the merger and acquisition. The awareness on the effect of the importance of cybersecurity policies has risen, and improved laws and regulations are being formulated and approved by the board of directors…………………………

APA

3891 words