
Sign up to save your podcasts
Or


To say mergers and acquisitions present significant risk is an understatement; however, additional vulnerabilities are being exposed as bad actors threaten to exploit privacy and data security leaks during the transition.
Chapters
00:00 Navigating Cybersecurity Risks in Mergers and Acquisitions 02:52 Understanding Data Privacy and Security Concerns 05:37 Assessing Data Retention and Legacy Systems 08:53 Identifying Dormant Liabilities and Hidden Risks 11:40 Integrating Acquired Companies and Vendor Risks 14:40 Website Compliance and Data Privacy Practices
By Jackson Lewis P.C.5
2828 ratings
To say mergers and acquisitions present significant risk is an understatement; however, additional vulnerabilities are being exposed as bad actors threaten to exploit privacy and data security leaks during the transition.
Chapters
00:00 Navigating Cybersecurity Risks in Mergers and Acquisitions 02:52 Understanding Data Privacy and Security Concerns 05:37 Assessing Data Retention and Legacy Systems 08:53 Identifying Dormant Liabilities and Hidden Risks 11:40 Integrating Acquired Companies and Vendor Risks 14:40 Website Compliance and Data Privacy Practices

91,056 Listeners

43,947 Listeners

30,687 Listeners

38,668 Listeners

25,874 Listeners

11,524 Listeners

8,766 Listeners

15 Listeners

87,722 Listeners

112,946 Listeners

56,549 Listeners

59,306 Listeners

146 Listeners

16,095 Listeners

1,143 Listeners