Course Hero Logo

Thomas_Mitchell_Report.docx - Running head: ACQUISITION...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 14 pages.

Running head: ACQUISITION REPORT1Acquisition ReportThomas MitchellUMGC
ACQUISITION REPORT2Acquisition ReportExecutive SummaryThe purpose of this summary is the reporting of a security assessment that will help aidthe company in deciding of making and weighing the different factors during this specific mergerand with the acquisition of the target company. With the acquisition of the streaming company,are to require distributing, secure, and maintain the services. This specific security assessmentfor the streaming company, has revealed a large gap in the security infrastructure, policies, andthe planning involved. There is also a network that is configured differently; however, it uses thesame hardware. The policies would need to be streamlined between the company and thestreaming company.We also have a responsibility of knowing the gaps within the network, and we also needto know about the benefits and the different shortcomings of the different tools that are used. Wealso need to identify the different firewalls, DMZ, and of the status of the systems in place.We have providing the executives of the company, an overview of the supply chain.Acquiring this new company mean that we will be inheriting risks that is associated within theoverview report. We will have to list the security measures, so that we can mitigate the risks.We will also be conducting interviews with the company’s current cybersecurity teamabout the vulnerability management. While conducting the interviews, we would need to educatethe different users of the network.After conducting the report, we would need to update the employees on the differentpolicies, processes, and the other aspects that may have changed while acquiring the newcompany. Within this report we will make sure to explain the acquisition in full, and to makesure that everything is addressed.
ACQUISITION REPORT3IntroductionThe cyber security team has conducted a review that has been contained to be written outin this report. With the different risk that may occur, to mitigate these risks we need to have aplace to make sure that the Data Protection Plan is to include encryption services for the hostingplatform from the streaming company. With the acquisition of the streaming company, are torequire distributing, secure, and maintain the services. This specific security assessment for thestreaming company, has revealed a large gap in the security infrastructure, policies, and theplanning involved. There is also a network that is configured differently; however, it uses thesame hardware. The policies would need to be streamlined between the company and thestreaming company.Policy Gap AnalysisThe merger and the acquisition can be chaotic at times for companies, this requires anincrease of focus on attacks on the company. [ CITATION Moi19 \l 1033 ] With variouscommunications between the 2 companies, there needs to be a security plan in place to make

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 14 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture