Unlock Tool

Get Instant Access

Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Info-Tech Research Group
  • Home
  • What We Do
  • Customer Reviews
  • Events & Webinars
  • Pricing
  • 4 3 2 More
    • What We Do
    • Customer Reviews
    • Events & Webinars
    • Pricing
  • View Member Site
  • Request a Demo
Sign In
Sign into SoftwareReviews Vendor Portal
Info-Tech Research Group
MENUCLOSE
  • Home
  • What We Do
  • Customer Reviews
  • Events & Webinars
  • Pricing
  • 1-888-670-8889
  • View Member Site
  • Request a Demo
    • Sign into SoftwareReviews Vendor Portal
    • Sign In
  • Technology Research
  • Security
  • Security Risk, Strategy & Governance
  • Governance, Risk & Compliance

Security M&A Due Diligence Tool

Author(s): Kate Wood

Use this tool to help define and track a due diligence workflow for managing cybersecurity during an M&A, including:

  • Managing workflow
  • Conducting discovery and interviews
  • Assessing M&A cyber risks
  • Conducting compromise diagnostics

Tags

Cyber security, cybersecurity, information security, mergers, acquisitions, M&A, due diligence, compromise diagnostics
Share on Social

Select Social Platform:

Share on Twitter Share on LinkedIn

View the Complete Blueprint:

Thought model representing Master M&A Cybersecurity Due Diligence

Master M&A Cybersecurity Due Diligence

Develop an information security playbook for mergers and acquisitions.

Related Content: Security

Thought model representing Master M&A Cybersecurity Due Diligence

Master M&A Cybersecurity Due Diligence

Thought model representing Master M&A Cybersecurity Due Diligence – Phases 1-2

Master M&A Cybersecurity Due Diligence – Phases 1-2

Thought model representing Master M&A Cybersecurity Due Diligence – Executive Brief

Master M&A Cybersecurity Due Diligence – Executive Brief

Thought model representing Make IT a Partner in Successful M&A Due Diligence

Make IT a Partner in Successful M&A Due Diligence

Thought model representing Merger & Acquisition Target Technology Environment Selection Tool

Merger & Acquisition Target Technology Environment Selection Tool

View all Related Content
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171

Want
Measurable
Results?

Let us show you how.
Join over 30,000 members
worldwide using our research.

Become a Member

Company

  • About Us
  • Careers
  • Newsroom
  •  
  • Usage & Citation
  • Terms of Use
  • Privacy Policy
  • Modern Slavery Statement

Partner With Us

  • Partners
  • LIVE Media Kit

How We Deliver

  • Do-It-Yourself
  • Over the Phone
  • Onsite
  • Consulting

Member Resources

  • Browse Research

Become a Member

  • Become a Member

Certifications

  • American Institute of Chartered Professional Accountants’ Service Organization Controls (SOC) certification
  • National Cyber Security Centre’s Cyber Essentials certification
  • The PwC certification seal

Call Us Today

North America

1-888-670-8889

International

+1-703-340-1171 Contact Us
itrg hash mark
© Info-Tech Research Group | Terms of Use | Privacy Policy

Please confirm the appointment time and click Schedule.

### DATE START ###

New

Info-Tech, McLean & Company, and SoftwareReviews are introducing single sign-on.

  • Use your current credentials to sign in on the next page.
  • If you have one membership, nothing will change for you - just sign in as usual.
  • If you have more than one membership, the account email and password you use the first time will be applied to every membership.

Sites included

  • Info-Tech Research Group
  • McLean & Company
  • McLean 360 Feedback
  • McLean Connect
  • McLean EXM
  • SoftwareReviews Vendor Portal