Cybersecurity Now Part of Due Diligence Process: Hidden Risks
Cybersecurity Now Part of Due Diligence Process: Hidden Risks
Process
By: Imran Ahmad, Gary Volman, and Deven Rath
Given the accelerated pace at which businesses are digitizing taking on that risk. Failure to identify problems can result
their operations and assets, the importance of cybersecurity in discovering, after the fact, issues and liabilities that may
cannot be underscored enough. In the context of an M&A not only diminish the value of the acquisition, but can also
transaction, implementing appropriate cybersecurity result in having to commit significant additional resources to
measures is essential given that the buyer is likely paying a resolve them. Put simply, buyers want to avoid a situation
premium for the target and any failure to accurately assess where they have bought a lemon.
cyber risks may result in a reduced value of the acquisition
As the Yahoo-Verizon case study shows, identifying
or previously unknown litigation exposure. With the
cybersecurity risks during the due diligence phase of a deal
assistance of cybersecurity experts, due diligence can be
is increasingly important, because if the company does not
tailored to ensure that the risks are known and appropriately
detect problems before the deal closes, it risks sustaining
managed so that there are no unexpected surprises post-
losses afterwards. The earlier a buyer can identify problems,
transaction.
the more opportunity it will have to manage the associated
risks: by resolving them, re-negotiating the purchase price,
Hidden Risks or delaying the closing date, if necessary.
It was recently announced that Yahoo! Inc. (Yahoo) and Broadly speaking, cybersecurity risks include the following:
Verizon Communications Inc. (Verizon) had reached an
Business interruption
agreement whereby the purchase price was reduced by
$350 million. Yahoo will be responsible for evenly splitting Legal liability, including litigation
the cash liabilities that may arise from non-Securities and Regulatory investigation and enforcement action
Exchange Commission (SEC) government investigations
Failure to meeting contractual obligations
and third-party litigation related to the breaches. In addition,
Yahoo will continue to be responsible for SEC investigations Loss of critical data (e.g., intellectual property, trade
and shareholder lawsuits. The adjustment to the purchase secrets, etc.)
price stems directly from the data breaches Yahoo reported Reputational harm
over the summer of 2016. This case serves as a reminder of Inconvenience to customers and loss of trust
the importance of a due diligence process that includes an
Expenses related to recovering the data
in-depth review of the targets cybersecurity posture.
Loss of revenue, etc.
Avoid Buying A Lemon Given the potential impact a cyber-incident can have on an
organization, it is no surprise that buyers are increasingly
Acquiring a business can create a number of advantages for
demanding that a cybersecurity due diligence process be
the buyer, but also inherently carries certain risks, such as
undertaken and the findings factor into the negotiation of the
environmental liabilities or obligations to employees. This
purchase agreement.
is why a thorough due diligence process is essential, since
it allows the buyer to identify the level of risk associated
with the transaction and ensure that it is comfortable
Covering the Bases risks or to compare the findings with accepted industry-
specific benchmarks. Experts may conduct necessary on-site
The following elements should be, at a minimum, part of any testing and assess the suitability of the programs in place to
cybersecurity due diligence process. This is by no means an manage risks to both physical security (access to locations/
exhaustive list and it would need to be customized based on computers) and technical security (encryption, firewalls,
the input of cybersecurity experts, depending on the nature of network monitoring). They will also ascertain the costs and
the targets business. Nevertheless, it is a good baseline from consequences of any potential vulnerabilities identified during
which to start. the engagement stage.
millerthomson.com
vancouver calgary edmonton saskatoon regina london kitchener-waterloo guelph toronto vaughan markham montral