<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cybersecurity Assessments in Mergers and Acquisition in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/85810#M5221</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In terms of Mergers &amp;amp; Acquisitions, I noticed this question was floating about since 2022.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So rather than do the traditional method of researching, I used Claude AI to do the arms and legs to create a document on what needs to be done for handling a merger &amp;amp; acquisition within a financial institution.&amp;nbsp; &amp;nbsp;Warts and all, it is a starting point, others can embellish it as they wish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it is a good starting point, and others will embellish and supplement it subsequently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Sun, 23 Nov 2025 20:14:07 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2025-11-23T20:14:07Z</dc:date>
    <item>
      <title>Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50569#M3465</link>
      <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I would like your precious help with supportive documents and playbook, opinions and guideline about a M&amp;amp;A that is happening on my current company. I do work on a financial institution so the cybersecurity threat and assessment need to be done.&lt;BR /&gt;I’m struggling a little bit finding the right resources in order to create a document containing the strategy, cybersecurity risks, assessment and checklist for the merge until the finalization and future company.&lt;BR /&gt;Any help it is more than welcomed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Kind Regards&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2022 17:53:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50569#M3465</guid>
      <dc:creator>nando</dc:creator>
      <dc:date>2022-04-14T17:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50736#M3466</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/635433131"&gt;@nando&lt;/a&gt;&amp;nbsp;&amp;nbsp; Apologies for leaving you in the /dev/null situation for the past couple of weeks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found an IBV Insights reports, which may hold some guidance for you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also googled around and asked :&amp;nbsp; &lt;A href="https://pages.sharevault.com/resources/checklists-21?_ga=2.163004159.271460557.1650891306-71729396.1647446454" target="_blank"&gt;https://pages.sharevault.com/resources/checklists-21?_ga=2.163004159.271460557.1650891306-71729396.1647446454&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try these for starters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 21:22:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50736#M3466</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-04-26T21:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50808#M3470</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/909340207"&gt;@Elwyn&lt;/a&gt;I would extend that slightly by stating the executive board and the Shareholders responsible for the fiduciary health of the organisation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2022 20:38:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50808#M3470</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-05-02T20:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50970#M3481</link>
      <description>&lt;P&gt;In my previous role, I had to write this up from scratch.&amp;nbsp; Most of my work dealt with technical elements, so naturally there's a lot of networking, ERP, defense strategies, and strategies to upgrade and homogenize to a uniform network.&amp;nbsp; Therefore, there's not a lot of GRC strategy in my documents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll find them tonight, sanitize them, and send you a DM copy of what I used.&amp;nbsp; maybe it could help.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 17:01:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/50970#M3481</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2022-05-12T17:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/66695#M4262</link>
      <description>&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you still have the sanitized document, I would love to read them. Thanks in advance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;jay&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 15:56:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/66695#M4262</guid>
      <dc:creator>cJAY</dc:creator>
      <dc:date>2024-01-29T15:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/70101#M4418</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´m interested in your document too&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you share a copy with me ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wilson&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 16:32:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/70101#M4418</guid>
      <dc:creator>Wspeing</dc:creator>
      <dc:date>2024-05-08T16:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/70103#M4419</link>
      <description>&lt;P&gt;Oh, my.&amp;nbsp; Let me see if I can still find it!&amp;nbsp; I am sorry,&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/386404219"&gt;@cJAY&lt;/a&gt;, for missing your reply so long ago.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 18:06:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/70103#M4419</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-05-08T18:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/71074#M4434</link>
      <description>I am interested pls</description>
      <pubDate>Sat, 08 Jun 2024 22:25:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/71074#M4434</guid>
      <dc:creator>Victor25</dc:creator>
      <dc:date>2024-06-08T22:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/73126#M4519</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wondering if you still had quick access to these. &amp;nbsp;&lt;/P&gt;&lt;P&gt;You are very kind to have been willing to sanitize and share.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 14:56:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/73126#M4519</guid>
      <dc:creator>Edge-Lee</dc:creator>
      <dc:date>2024-08-15T14:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/73207#M4522</link>
      <description>&lt;P&gt;I have been terrible in this thread.&amp;nbsp; I will work on this tonight.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2024 20:42:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/73207#M4522</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-08-18T20:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/85727#M5214</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please I would like to read the documents too. Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 03:49:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/85727#M5214</guid>
      <dc:creator>ajibadetimi</dc:creator>
      <dc:date>2025-11-21T03:49:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Assessments in Mergers and Acquisition</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/85810#M5221</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In terms of Mergers &amp;amp; Acquisitions, I noticed this question was floating about since 2022.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So rather than do the traditional method of researching, I used Claude AI to do the arms and legs to create a document on what needs to be done for handling a merger &amp;amp; acquisition within a financial institution.&amp;nbsp; &amp;nbsp;Warts and all, it is a starting point, others can embellish it as they wish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it is a good starting point, and others will embellish and supplement it subsequently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 23 Nov 2025 20:14:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cybersecurity-Assessments-in-Mergers-and-Acquisition/m-p/85810#M5221</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-11-23T20:14:07Z</dc:date>
    </item>
  </channel>
</rss>

