Course Hero Logo

With a rounded training initiative employees will be

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 18 - 21 out of 21 pages.

With a rounded training initiative, employees will be well served with the changes thatare coming. Ensuring that they know what changes will and won’t happen, how those changeswill affect their jobs, and what resources they can use to learn more about the merger will helpwith smooth transitions.CONCLUSIONMerging with another organization is a daunting task in terms of the work that isnecessary to incorporate the components of the target organization into a single corporate
Cybersecurity System Security report for Successful Acquisition19structure. Even more so when considering the security aspects of the merge. Because this is atime of transition, there is a greater potential for security to be overlooked. Doing due diligenceand ensuring that the merge take place with a security focus is critical to minimizing any securityrisks that could take place during the merge. The likelihood of an attack taking place in thismerger period is elevated because of the potential of vulnerable systems being reconfigured andconnected to secure systems. Policy gaps exist between the two separate organizations and stepsneed to be taken to bring those policies in line prior to integrating infrastructure. The targetorganization utilizes different technologies such as RTP and those technologies need to beunderstood to maximize security. Taking into consideration the supply chain of the targetorganization is necessary to mitigating any future supply chain vulnerabilities which couldimpact the new organization. The ever-changing threat landscape requires an ever-vigilantvulnerability management program which will work to continuously defend against new threats.Employees of both organizations will see a sea change in their day to day operations and theywill need training to ensure that they are equipped with the knowledge necessary to do their jobseffectively. By thoroughly examining the merger and its impacts on security, due diligence hasbeen done and informed decisions can be made.
Cybersecurity System Security report for Successful Acquisition20REFERENCESCarnegie Mellon. (2016, August 11). CERT Coordination Center. Retrieved fromDawson, Donald. (2010) "The Role of IT in Successful Merger Integration." Strategy& - theGlobal Strategy Consulting Team at PwC, Booz & Company, Retrieved fromon.pdf. Accessed 25 Nov. 2018.Hartman, Anita. (Aug, 2001) “Security Considerations in the Merger/Acquisition Process.SANS Institute: Information Security Resources, Retrieved from -room/whitepapers/casestudies/paper/667.Manzuik, S., & Gold, A. (2007).Network security assessment from vulnerability to patch.Rockland, MA: Syngress Pub.
Cybersecurity System Security report for Successful Acquisition21Official PCI Security Standards Council Site (Dec, 2018) -Verify PCI Compliance, DownloadData Security and Credit Card Security Standards.PCI Security Standards Council®,Retrieved from .Shanks, Wylie. (11, May 2015)"Building a Vulnerability Management Program - A projectmanagement approach."Information Security Training | SANS Cyber SecurityCertifications & Research, SANS Institute: Reading Room - Project Management,Retrieved from -room/whitepapers/projectmanagement/paper/35932.
End of preview. Want to read all 21 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags
Information Security, Computer Security, successful acquisition

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture