Case Study: M&A Cyber Risk Report

A Fortune 500 technology consulting company that regularly engages in M&A had concerns with the cyber security risk exposure of some recent acquisitions. After having a significant cyber security incident, the company contracted with Kroll to perform an objective, discreet and external review of the cyber risk exposure of their future acquisition targets. 

The Kroll team leveraged the CyberClarity360 platform to examine dozens of security criteria and industry benchmark data to provide both an absolute and relative cyber risk score for each target. Using this platform, Kroll evaluated:

  • The target's “attack surface” to better calculate risk and impact associated with visible digital assets
  • Key security metrics of the target's external IT infrastructure and public facing digital assets (e.g., website, web applications, portals, email servers, etc.)
  • Individual business credentials, accounts, passwords, profiles or other data linked to the target that had been exposed in breaches

By engaging Kroll, the consulting company can now understand the potential cyber risk exposure of their acquisitions and make better decisions about potential acquisition targets. Additionally, they can compare and contrast these external reviews with assessments their post-acquisition team performed of the target's cyber security maturity.

Case Study: M&A Cyber Risk Report 2020-07-22T00:00:00.0000000 /en/insights/publications/compliance-risk/case-study-ma-cyber-risk-report /-/media/kroll/images/publications/featured-images/case-study-ma-cyber-risk-report-300-200.jpg publication {A3EB9E2E-8783-4B02-B2B2-343CD13039FB} {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {5739AB31-18AC-48E3-B19F-E23AB7AB9E57} {144A7548-A9F0-4228-93CC-9A86304CD5E8} {9D5BD9CA-5878-4DAC-8479-DB1E7058F0DD}

Other Areas We Can Help


Cyber Risk

CyberClarity360 Express Helps Fortune 25 Technology Client Identify and Prioritize Legal Vendor Cyber Risk

Cyber Risk
The Monitor

Telerik Vulnerability (CVE-2019-18935) Creates Surge in Web Compromise and Cryptomining Attacks - The Monitor, Issue 14

The Monitor