HomeVulnerabilityProbably the most harmful time for enterprise security? One month after an...

Probably the most harmful time for enterprise security? One month after an acquisition

However, he famous, he additionally wanted to create a 100-day plan to exactly attempt to handle the brand new dangers. “How do I place blame for the entire crap that I had no management over? It’s actually concerning the CISO managing the chance for an organized marriage. Even worse, that is an organized second marriage the place each events have a whole lot of historical past and either side include a number of baggage,” he stated.

One other former CISO, Michael Traces, helmed cybersecurity operations at PWC, TransUnion, and FICO. He at present is principal of cybersecurity vendor Heuristic Safety.

He, too, is accustomed to the cybersecurity issues of the post-acquisition holding interval. “That is one thing that I do have expertise with, each as an acquirer, and being acquired,” he stated. “Usually, infosec is the tail on the canine of the acquisition, introduced in late to the method, and there may be typically an unspoken expectation to not rock the boat on the acquisition. To the extent that points are recognized, it must be one thing catastrophic to derail the deal. What I’m saying is that enterprise pursuits decide whether or not the deal occurs — infosec is commonly only a field to be checked.”

See also  North Korean hackers are focusing on security researchers: Google
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular