NBC News, Nov. 10, 2016
A private equity firm faces substantial risk when adding new investments to its portfolio, and undetected risk can negatively impact investors. Cyber risk represents a major threat to valuation through potential lost revenue, derivative lawsuits and regulatory actions, and reputational damage. How can a private equity firm protect itself from adding substantial cyber risk to its portfolio?
The answer is obvious: evaluate the target company’s cyber resilience as part of the due diligence process. For both boards of directors and acquirers, cyber risk should be handled and managed in the same manner as other types of risk. The Audit Committee of the board is tasked with identifying and mitigating various forms of risk that threaten shareholder value, and cyber risk must be on the list. Similarly, acquirers like PE firms need to identify any and all risks to valuation during the due diligence process, and cyber risk must be included in their analyses.
Cyber risk is measured by comparing a company’s operational processes against some form of standard and reporting the results. How it’s accomplished varies, including the standard chosen, the manpower consumed, and the credibility of the resulting report. If Joe Fred Consulting compares the company against its spreadsheet list of detailed questions, credibility of the resulting report rests upon the consulting firm’s reputation for its cybersecurity expertise. Using proprietary checklists leaves boards and PE firms open to criticism from, and even actions by, shareholders if a subsequent breach occurs, even if they employed a credible consulting firm.
Assessing cyber maturity against a widely recognized standard is a much safer option for due diligence. The Cyber Security Framework (CSF) developed by NIST is by far the most often recommended benchmark, and it should be adopted as the foundation upon which to build a cyber risk assessment. It was developed by experts, is hailed as the gold standard in the U.S., and is gaining considerable interest outside North America.
The level of manpower consumed during an assessment is another key issue for PE firms. After signing a letter of intent that defines the planned transaction, the typical due diligence period is 60 to 90 days, and a cyber risk assessment must fit within that period. Traditional one-time cyber assessments involve hiring a large consulting firm with its own proprietary checklists. Large numbers of analysts fan out across the organization to gather information, and in the end, a comprehensive report based on the checklists is delivered.
This traditional approach isn’t practical for a pending acquisition. It takes too long to fit within the due diligence period, the additional temporary staff introduced are disruptive to operations, and the process can raise suspicion among employees about a pending transaction.
An automated process based upon recognized standards like CSF, HIPAA, and FFIEC is the optimal answer for assessing cyber risk during due diligence. Automating with a SaaS platform based on these standards enables completion of a comprehensive, organization-wide assessment within 30 days. The manpower consumed is minimized, and the credibility of the result is maximized.