Jason Button leads the Cisco Safety and Belief Mergers and Acquisitions (M&A) group. He was previously the director of IT at Duo Safety, an organization Cisco acquired in 2018, making him uniquely positioned to lend his experience to the M&A course of. This weblog is the continuation of a sequence centered on M&A cybersecurity listed on the finish of this submit.
This newest weblog submit will revisit the subject of Transferring Left to Proper: Cybersecurity Practices and Outcomes in M&A Due Diligence and classes discovered from implementing Cisco’s M&A Cybersecurity Framework final yr.
On this yr alone, Cisco has made ten acquisition bulletins, starting from small, agile start-ups to well-established, publicly traded corporations. The various dimension and complexity of the businesses we’re seeking to purchase entail that we establish, assess, and alter for threat in another way.
Our M&A Cybersecurity Framework has allowed us to scale and streamline our discovery and threat evaluation processes to higher align with the extent of safety threat a deal poses. Utilizing customary safety guardrails, tooling, techniques info, and different automated processes to display and assess non-integrated dangers, we will draft a Discovery Danger Evaluation earlier, thereby releasing up groups to give attention to assessing extra complicated acquisitions and doubtlessly larger safety dangers.
Proper-sizing your threat evaluation method has further advantages, together with the power to establish areas of integration threat to speed up integration after the deal closes. An instance is the Valtix acquisition earlier this yr, the place we performed an aggressive and thorough discovery investigation to shut the deal earlier than the top of April. The driving issue was the chance to debut an important product integration demonstration in early June at Cisco Dwell, our flagship buyer occasion.
To satisfy this timeline, we wanted to make sure that the safety threat was manageable and that we had stakeholder buy-in. We labored intently with cross-functional groups to establish and prioritize threat mitigation in order that we may meet our dedication. By having a strong framework in place, we had been in a position to speed up the mixing course of whereas enabling the Valtix workforce to be simpler and productive in a brief period of time.
One other lesson we’ve discovered is prioritizing visibility into the acquired infrastructure earlier within the course of. Deploying instruments like Wiz.io and JuniperOne helps educate us about new environments and permits us to establish dangers sooner. That is important when triaging and prioritizing efforts between the corporate being acquired and the enterprise will probably be absorbed into. For the Armorblox and SamKnows acquisitions, we had been in a position to give attention to high-priority dangers and spend much less time spreading efforts throughout a number of work streams. Having a framework that helps us prioritize dangers is what’s most vital and in the end makes for higher, safer merchandise.
Wanting Again to Energy Ahead
One other vital lesson discovered this yr was the right way to apply the M&A framework to re-visit earlier acquisitions to evaluate and perceive threat. Going by this course of with out time constraints or diligence pressures allowed us to hone our investigative strategies and refine our practices. For instance, we labored with the Meraki workforce, a mature group that was acquired over ten years in the past and a big contributor to Cisco’s portfolio. We combed by a decade’s value of information to tell how we may simplify and streamline key areas of our integration framework and enhance our total safety stance.
Securely Enabling Enterprise Progress
One of many driving components for Cisco to accumulate corporations is to establish and spend money on new improvements that can enhance the safety and efficiency of our resolution portfolio. The M&A Cybersecurity workforce works intently with Cisco’s Company Improvement Integration workforce to evaluate and handle threat all through the invention, diligence, and integration course of.
The M&A Cybersecurity Framework has been a helpful device to make sure that enterprise, engineering, and operations leaders align and give attention to integration effectively earlier than the deal closes. Operational alignment with IT, Safety, and different capabilities has helped floor vital points, equivalent to addressing workflows and consumer and buyer identities earlier than the mixing course of. We’ve additionally discovered that by elevating safety early within the M&A course of, we’re serving to the enterprise take away obstacles that might get in the way in which of enterprise targets and obtain its worth drivers quicker, which results in accelerated enterprise progress.
Incomes and Sustaining Belief
Management skilled Simon Sinek has continuously said, “A workforce is just not a bunch of people that work collectively. A workforce is a bunch of people that belief one another.”
Our M&A Cybersecurity Framework is a helpful device to assist securely allow the mergers and acquisition course of. Nevertheless, you may’t underestimate the private components wanted to make it successful. Constructing belief throughout a workforce takes time and requires specializing in growing relationships, being empathetic, and demonstrating respect for a corporation’s tradition.
The press launch saying Cisco’s intention to accumulate Splunk cited one of many key worth propositions: “Unites two “Nice Locations to Work” with related values, sturdy cultures, and gifted groups.” The M&A course of is way more than the mental property and expertise being acquired; the human capital and cultural strengths are sometimes probably the most helpful property.
Wanting again this yr, my colleague Mo Iqbal summed it up finest, “We will’t perceive the applied sciences till we perceive the individuals and tradition that enabled them to be so profitable.”
In case you are inquisitive about studying extra, please learn Greater than an Asset: The Folks Aspect of Mergers & Acquisitions.
We’d love to listen to what you suppose. Ask a Query, Remark Beneath, and Keep Related with Cisco Safe on social!
Cisco Safe Social Channels