Comprehensive software reviews to make better IT decisions
Small Enterprise SituAction: A New CIO Prepares for M&A
Mergers and acquisitions are challenging for many IT leaders in small enterprises. Use Info-Tech’s resources to assist with appropriate due diligence and prepare for eventual integration.
Situation: A long-time Info-Tech member joins a large professional services firm spread across several Canadian provinces with smaller operations in South America and the southern United States. Within a few months, her new company is acquired by a private equity (PE) firm as part of a strategy to consolidate that particular corner of the market.
Complication: The acquisition changes the role of IT and the newly minted CIO. She had expected to fulfill a largely operational role, but now has a much more strategic one. The PE partners expect her to be involved in due diligence as they pursue new acquisition targets. She is excited by the change in role, but also intimidated due to her lack of familiarity with mergers and acquisitions.
She needs to get up to speed. Fast.
- Make IT a Partner in Successful M&A Due Diligence. Mergers and acquisitions are a major IT challenge. Ideally, IT is involved before the deal actually closes and can provide some guidance on the feasibility and challenges of integration. Some of the relevant resources are:
- IT M&A Capabilities Readiness Check Template (PowerPoint)
- IT Due Diligence Report (Excel)
- Business Modeling Template (PowerPoint)
- Merger & Acquisition Target Technology Environment Selection Tool (Excel)
- Make IT a Successful Partner in M&A Integration. After due diligence, there is integration. It involves – by definition – a lot of planning and a lot of change. IT leaders must put a plan together. Some of the relevant resources are:
- M&A Runbook for Infrastructure & Operations. This blueprint focuses specifically on the integration challenges related to I&O. Neither the acquiring company nor the company to be acquired have an easy time of it. This blueprint is a practical guide to overcome the deer-in-the-headlights reaction of many IT executives to the prospect of M&A. Some of the relevant resources are:
- Don’t Allow Software Licensing to Derail Your M&A. Software licensing is a crucial component of effective planning for M&A activity. It's complicated and it often gets overlooked. Some of the relevant resources are:
Info-Tech’s blueprints and tools are valuable starting points for getting IT leaders up to speed quickly with their M&A-related responsibilities.
Want to Know More?
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.