Cybersecurity Diligence in Private Equity Transactions: A Q&A with Experts Who Have Completed Hundreds of Deals

Cybersecurity Diligence in Private Equity Transactions: A Q&A with Experts Who Have Completed Hundreds of Deals

Cybersecurity. It’s something that you need to be aware of both when you’re looking to acquire and once you’ve acquired in the continued day-to-day operations of the company. You don’t want to risk your data being exposed, being embarrassed, or suffering financial loss. Alex Agran, host of the Private Equity Technology Podcast, recently interviewed two West Monroe...

Read More
Why should electric utilities take a closer look at supply chain risk management?

Why should electric utilities take a closer look at supply chain risk management?

Three years ago, I managed the vendor evaluation process for a utility assessing wireless options for telecom connectivity to substations. The field was limited to two vendors and cybersecurity was an important topic we wanted to explore in more detail with each. One specific area we sought to understand was the process used to address any cybersecurity issues that might arise with the...

Read More
Is My Organization in Scope for GDPR?

Is My Organization in Scope for GDPR?

Starting May 25th, the EU’s General Data Protection Regulation (GDPR) is taking effect. Despite the looming start date, there are many organizations that are still unclear about the language of the regulation and why organizations in the US should be aware. A good starting point for understanding how GDPR may affect your organization is to determine if GDPR even applies, and if so, what is...

Read More
Blockchain in Energy: The Future of Tomorrow?

Blockchain in Energy: The Future of Tomorrow?

The Blockchain in Energy Forum, hosted by Greentech Media in New York last week, gathered leaders from across utilities, start-ups, investors, and policymakers for a day of networking and discussion on recent innovations, best practices and future developments in the use of blockchain technology in the energy sector. The agenda offered participants a chance to gain a better understanding of...

Read More
Cybersecurity in the Age of Digital Transformation

Cybersecurity in the Age of Digital Transformation

Customer experience (CX) in the utility industry is undergoing dramatic change. Customers want more access to information, more choices to access information (such as mobile and social media) and enhanced ability to manage costs. To meet this need, utility companies are striving to engage their customers using data analytics, monitoring and control in the modern ecosystem of Internet of Things...

Read More
Meltdown and Spectre: What You Need to Know

Meltdown and Spectre: What You Need to Know

What does it mean when I hear about the Spectre and Meltdown vulnerabilities? In simple terms, these vulnerabilities allow unauthorized access to sensitive memory content on computing systems that should never be allowed. Successful exploitation of these vulnerabilities can compromise the core system integrity and all multi-tenant users or processes on a system; think public/private clouds...

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Protecting M&A Portfolios from Cyber Threats – It’s Not Just the Obvious Targets

Protecting M&A Portfolios from Cyber Threats – It’s Not Just the Obvious Targets

We spend a lot of time these days talking with private equity investors about the importance of cyber security for their target and portfolio companies. While there is general agreement that it is critical to identify and mitigate potential cyber security risks, those efforts often focus only on the most obvious targets—companies dealing in credit card data, personal financial information, or...

Read More
Despite Heightened Attention To Cybersecurity Risks, Today’s Software Investors Don’t Feel Any Better Prepared

Despite Heightened Attention To Cybersecurity Risks, Today’s Software Investors Don’t Feel Any Better Prepared

During the first half of 2017, West Monroe and Mergermarket surveyed 100 senior private equity and corporate executives, all with organizations that have acquired at least one software firm over the past three years. Respondents cited various challenges to orchestrating a successful acquisition – one of the top among them being cybersecurity.…

Read More
Unpleasant Discoveries: Cybersecurity Vulnerabilities Uncovered

Unpleasant Discoveries: Cybersecurity Vulnerabilities Uncovered

It’s every acquirer’s worst nightmare: you’ve spent countless hours vetting an M&A target, and after the deal goes through, you catch something. West Monroe Partners surveyed top-level corporate executives and private equity partners about their companies’ practices in order to better understand the state of cybersecurity diligence for M&A. The results provide a window into the trends...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons