BUY-SIDE TECHNOLOGY DUE-DILIGENCE
Uncover critical technology issues and fully understand target's technology environment.
Buyers must fully evaluate technology opportunities and risks within a target company's information technology environment.
In addition to a traditional technology due-diligence investigation, buy-side cyber due-diligence uncovers critical technology issues and confirms effective practices and controls are in-place before deal closure.
Technology Due-Diligence
​
The goal of technology due-diligence is to provide a deeper understanding of a target's technology assets, capabilities and limitations. Our approach customizes the technology due-diligence process based on the particular target's profile and the specific acquisition drivers, resulting in an effective and efficient process.
Cyber Due-Diligence
​
Our cyber due-diligence approach leverages up-to-date best practices and tools to evaluate a target's cyber risk posture and performance against security and resiliency objectives. Our methodology focuses on 3 pillars of technology resiliency.

Identify Business Risk
Confirm technology risks have been identified and quantified in terms of financial impacts to the business.
-
​Review/develop accurate risk assessment.
-
Review risks in financial terms (revenue, valuation, sales.)
-
Review industry data regarding losses/impacts of cyber events.
Evaluate Mitigation Strategies
Confirm controls and risk mitigation practices/tools are in-place.
​
-
Confirm controls consistent with established trust criteria such as SOC2.
-
Evaluate maturity of controls, organization, and management.
-
Evaluate controls related to third-parties and sub-service organizations.​
Evaluate Effectiveness of Controls
Confirm effectiveness of controls to mitigate risk and impact.
-
Evaluate audit reports including penetration testing, vulnerability monitoring, patch cadence, etc.
-
Evaluate business continuity testing and performance against objectives (recovery point, recovery time, etc.)
-
Evaluate public cyber profile using attack surface evaluation tools.​
-
Evaluate appropriateness of in-place cyber insurance.