Vince Hardy, Cyber Security Consultant | May 30, 2024
Fortian works with a diverse range of clients who require cybersecurity services, ranging from small to medium enterprises all the way to some of Australia’s largest brands.
In the large enterprise sector, Fortian has provided cybersecurity support to corporate operations, including acquisitions (where one entity acquires another) and demergers (where a corporate group splits its operations into multiple entities or groups).
In the following blog post, Fortian security consultant Vince Hardy writes about demergers – their significance from a cybersecurity perspective and some of the cybersecurity considerations that should be considered during the demerger process.
In recent times, cyber security has become a hot topic for everyone from individuals to big organizations and even governments. The rise in cyber threats has made it crucial to amp up our cyber security measures. And when it comes to divestments and acquisitions, the need for cyber security is even more pressing.
A divestiture, also known as a demerger, is a restructure in which a company separates some of its business units or divisions into separate entities. This process involves division of a single business entity into two or more distinct companies, each having its own separate legal and operational existence.
During a divestiture, sensitive data and intellectual property may be transferred to another company or entity, potentially increasing the risk of data breaches or cyber-attacks. The company conducting the divestment is often concerned about swiftly signing on the “dotted line” and very seldom about the flow and impact to security and privacy. However, overlooking the implications for business continuity amidst these transactions can lead to significant disruptions in operations. It's crucial for organizations to consider how the transfer of data and intellectual property may affect ongoing business processes and ensure that adequate measures are in place to maintain operational continuity throughout the transition.
Cyber Security is essential during a divestment for several reasons. During a divestment, businesses may be required to disclose sensitive information such as financial, operational, and strategic information with the buyer. This information may contain customer data, financial data, and proprietary data. Both companies (buyer and seller) should ensure that security gaps and controls are first identified to prevent data breaches. It’s important to note that data and infrastructure are not the only targets of transfer, humans are also part of the process.
This blog post will provide practical guidance and actionable insights in to navigate cyber security challenges effectively during corporate demergers.
Identifying assets is a critical step in the security risk assessment process during a demerger. Assets, in the context of security, refers to any resource that requires protection. Assets can span multiple categories, namely the following:
Collaboration with information owners and data custodians is critical to understanding the various types of data that is within the scope of the transfer. Within this phase, the project team executing the demerger work with data custodians to create a data inventory, cataloguing the various types of data and their sources (applications or systems). The inventory serves as a foundation for the data classification process.
Leveraging threat modelling frameworks like MITRE ATT&CK or STRIDE offers a systematic method for evaluating risks during a demerger. These frameworks outline the tactics used by cyber attackers, aiding in the identification of potential threats to assets. By pinpointing entry points to the data within these assets, organizations can identify vulnerabilities in their security infrastructure. Comparing existing security controls with those detailed in the frameworks reveals any gaps or weaknesses. Through simulating attack scenarios, organizations can gain valuable insights into the potential impacts of security breaches, enabling the development of targeted mitigation strategies for high-priority areas.
The leadership team must be briefed on the diverse risks that could affect the success of a demerger, including the security of sensitive data and the overall welfare of both entities involved. Here are some critical risks to consider during the security risk assessment:
Data Security and Privacy Risks:
Operational Disruptions:
Regulatory Compliance:
Reputation Damage:
IT Access Control Risks:
Intellectual Property Risks:
Data classification is a critical process that involves categorizing and organising data based on its sensitivity, confidentiality, and importance to the business.
The objective is to ensure that the data is properly handled, protected, and transferred during the demerger process. The Information owner is the individual or entity responsible for the data and has the authority to determine the classification of data. Refer to the organisation’s data classification policies and guidelines that define the criteria for classifying data into categories. These policies establish the rules for determining the most appropriate classification level for different types of information.
While revoking all access of employees from demerging entities may appear simple, it could disrupt business continuity. Organizations often require ongoing operational support throughout the demerger process. Therefore, a balanced approach is essential to mitigate the risk of users retaining access to sensitive network resources. Diligent measures should be implemented to restrict access strictly to authorized systems and applications.
Understanding the significance of cyber security in demergers allows organizations to safeguard assets, protect data integrity, and mitigate risks such as data breaches, operational disruptions, and regulatory non-compliance. Collaboration with stakeholders, adherence to data classification policies, and diligent access controls are essential for success.
Navigating demergers and cyber security complexities requires vigilance, adaptability, and collaboration to ensure the security and integrity of operations. Stay tuned for a later instalment, where we'll explore strategies for data protection and regulatory compliance during corporate demergers.
Request a consultation with one of our security specialists today.
Get in touch