Security Basics mailing list archives

Re: Re: Information Security in Mergers and Acquisition


From: iganor () ipvsecurity com
Date: Mon, 21 Jul 2008 03:57:59 -0600

Alfred,

I would start with:
1) A gap analysis document between buyer's and acquirer's security policies.
2) For each of the organizations - a gap analysis between "actual" policies and procedures and the "written" security 
policies.
3) Based on the above documents (and management input) put a "new" security policy and get management sign-off.
4) Put a plan of what's required to be done for each "organization" to adopt the merged security policy.

Obviously it is easy said than done!

Ido


Current thread: