Stir in a Little Merger and Acquisition, and Voila, Youre a Target

Published: Jan. 10, 2023, 11 a.m.

All links and images for this episode can be found on CISO Series.

There is a lot unknown before, during, and after a merger and that can make employees very susceptible to phishing attacks. But, at the same time, the due diligence that goes into an M&A can often open up signs of previous or active compromise, noted Rich Mason of Critical Infrastructure.

What does a proposed merger do to a security program?"

This week\u2019s episode is hosted by me,\xa0David Spark\xa0(@dspark), producer of CISO Series and\xa0Andy Ellis\xa0(@csoandy), operating partner,\xa0YL Ventures.\xa0Our guest is Nicole Ford (@nicoledgray), global vp and CISO, Rockwell Automation.

Thanks to our podcast sponsor, Pentera

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment, at any scale.

In this episode:

  • As a security leader, how does your security posture change when you know given your assets you are a specific target vs. just an opportunity?
  • Could similar critical infrastructure agencies be grouped together and therefore share cybersecurity resources?
  • What does a proposed merger do to a security program?