What residual risk to the target company’s assets and IP remain
You need to identify what streaming the companies are doing and the specific technology they are leveraging.
What are the technical vulnerabilities associated with the protocols involved?
Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced somewhat, shifted to a third party, etc.)?
What residual risk to the target company’s assets and IP remain?
Would those risks extend to the current (takeover) company after the merger?
a. Would that be bad enough to cancel the M&A?
If the response to #5 is yes, then, what should the target company do to further mitigate the risk? How should the takeover company mitigate the risk?
What are the costs associated to the target company (implementing the appropriate
The policy gap analysis is the logical outline of the provision system security supported by the companies before the merger and acquisition. The awareness on the effect of the importance of cybersecurity policies has risen, and improved laws and regulations are being formulated and approved by the board of directors…………………………