Resources / Videos / The Landscape of M&A Cybersecurity
Dark Mode
June 28, 2023

The Landscape of M&A Cybersecurity

About this webinar

In today’s world, security risks during mergers and acquisitions (M&A) are rising, and staying on top of cybersecurity risks during transactions is more important than ever. Join us as we discuss cybersecurity in M&A, common risks during transactions, and real-life examples of breaches that could have been avoided.

Learn about the emerging trends in M&A cybersecurity, such as the rise in remote due diligence, greater emphasis on third-party risk management, increasing regulatory scrutiny, and cyber insurance. Our experts will also provide predictions for the future of M&A cybersecurity, including the continued rise in threats during transactions, new technologies for cybersecurity, and new regulations and guidelines.

But that’s not all! We will also share best practices for M&A cybersecurity, including conducting thorough due diligence, establishing a cybersecurity risk management program, aligning cybersecurity policies and procedures, and building a strong cybersecurity culture.

By the end of this webinar, you will understand why organizations should prioritize M&A cybersecurity and how to mitigate risks during transactions.

What you’ll learn

In the webinar “Cybersecurity in M&A,” you will learn key insights and strategies to navigate the complex intersection of cybersecurity and mergers and acquisitions. Here are the key things you can expect to learn:

  1. Understanding the Unique Cybersecurity Challenges in M&A: Gain awareness of the specific cybersecurity risks and challenges that arise during mergers and acquisitions. Explore how cyber threats can impact deal value, data security, and post-merger integration.
  2. Effective Cybersecurity Due Diligence: Learn best practices for conducting comprehensive cybersecurity due diligence during the M&A process. Discover how to assess the cybersecurity posture of target companies, identify potential vulnerabilities, and evaluate the impact on deal value.
  3. Risk Mitigation Strategies: Explore practical strategies and tactics to mitigate cyber risks in M&A transactions. Understand how to develop risk mitigation plans, address vulnerabilities, and ensure a smooth integration process to protect critical assets and sensitive data.
  4. Post-Merger Cybersecurity Integration: Discover crucial steps to integrate cybersecurity practices and systems after the M&A deal is completed. Learn how to align cybersecurity policies, cultures, and technologies across merged entities, ensuring a secure and cohesive environment.
  5. Industry Insights and Expert Perspectives: Benefit from the experience and insights of industry experts and cybersecurity professionals who have successfully navigated the challenges of cybersecurity in M&A. Gain valuable tips and lessons learned from real-world scenarios.

This on-demand webinar will equip you with the knowledge and strategies needed to effectively address cybersecurity concerns throughout the M&A lifecycle, safeguard your investments, and minimize potential risks. 

About the speakers

Tim Mather

Partner at Fortium Partners


Tim Mather is a Partner at Fortium Partners, an IT consulting firm where he has assisted many clients with security issues (including ransomware remediation), developing security programs, and security evaluations. Additionally, he also advises several cybersecurity start-ups on their product strategies and marketing, and a venture capital firm on investments in cybersecurity start-ups. 

Previously, Tim has held very senior security positions (e.g., CISO three times) for several high technology companies in the Silicon Valley. He has also worked for three cybersecurity start-ups.  Tim is also a Certified Information Systems Security Professional (CISSP), a Certified Information Security Auditor (CISA), and a Certified Information Systems Manager (CISM).  He also speaks frequently at security conferences (e.g., the RSA Conference) domestically and internationally, and association meetings (e.g., ISACA-SV).  To ensure that he is not bored, Tim has also co-authored two books on information security. The first, “The Executive Guide to Information Security: Threats, Challenges, and Solutions” was published by Addison-Wesley in 2004, and sold nearly twelve thousand copies.  The second, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance” was published by O’Reilly in 2009, sold over nineteen thousand copies, and was translated into Chinese and Japanese. 

Tim is also passionate about education having his Bachelor’s Degree in Political Economics from the University of California at Berkeley, as well as Master’s Degrees in International Policy Studies from Middlebury Institute of International Studies at Monterey, in National Security Studies from Georgetown University, and in Information Assurance from Brandeis University.  He was involved from the inception of the Cyber Security program at Merritt College in Oakland, California and has been teaching classes there since its accreditation. 

For fun, Tim loves to read and travel, and spending time with his cats when home. 

Tim started his career in the U.S. Army as a Signals Intelligence office (35G), then moved to Washington, D.C. where he worked on a ‘black’ (classified) project as a liaison to the intelligence community for seven and a half years. 

Scott Rosa

CIO at IDG, Inc.


Scott has spent his career in roles spanning both Business and Information Technology organizations. Scott began his career in the Finance and Accounting field before his transition into the Information Technology organization at Analog Devices.  

He is currently Chief Information Officer at International Data Group, a company which provides expert, high tech industry analysis and data services along with a rapidly evolving B2B MarTech capability.  

Scott holds a BA in Accounting from Assumption University and an MBA/MIS degree from Bentley University.  

Scott currently resides in Massachusetts with his wife and three children.  

Anna Sherony

Partner at Fortium Partners


Anna Sherony is a Fortium Partner in Fortium’s Midwest Region. She provides Virtual and Fractional Chief Information Security Officer (CISO) consulting services for her clients.

She has more than 19 years of C-level experience as a security and privacy consultant, strategist, and systems implementer for large institutions in the financial services, insurance, health care, and pharmaceutical sectors.

As CSO/CPO for Sammons Financial Group, she was responsible for the company’s information security, as well as privacy assurance strategy, architecture, and global oversight, including mainframe, distributed, and infrastructure-based systems.

Anna routinely consults with CEOs, CFOs, and Board Directors / Audit Committees on cybersecurity issues and strategies.  Her consulting practice includes a diverse range of M&A and cybersecurity initiatives, including due diligence/risk mitigation; establishing comprehensive security and privacy programs for data loss prevention; GDPR Compliance; NIST Cybersecurity Frameworks with CIS Critical Security Controls; SOC II Type II attestation audits for Customer Engagement Assurance; secure coding practices for developers; establishing key information technology processes;  plus, vendor security due diligence, web security, identity access and access management, security controls, privacy education, and threat awareness, among other elements.

Through her nonprofit work, Anna has provided support for hundreds of the wounded men and women of our Armed Forces serving in Iraq, Afghanistan, and around the world.

She is also a mom of a Marine and a Soldier who both proudly served our country.

Get a copy of the presentation

the Power of