To say mergers and acquisitions present significant risk is an understatement; however, additional vulnerabilities are being exposed as bad actors threaten to exploit privacy and data security leaks during the transition.
Chapters
00:00 Navigating Cybersecurity Risks in Mergers and Acquisitions 02:52 Understanding Data Privacy and Security Concerns 05:37 Assessing Data Retention and Legacy Systems 08:53 Identifying Dormant Liabilities and Hidden Risks 11:40 Integrating Acquired Companies and Vendor Risks 14:40 Website Compliance and Data Privacy Practices