Marita A. Makinen, Chair of the firm’s Mergers & Acquisitions practice and co-Chair of the Transactions & Advisory Group, and Ken Fishkin, CISSP, CIPP/US, CIPM, CIPT, Manager of Information Security at Lowenstein Sandler, discuss the importance of complying with cybersecurity regulations within the context of mergers and acquisitions. Using the CafePress-Snapfish data breach case as an example, they explain how data privacy and data security can impact M&A transactions, particularly when the companies involved are consumer-facing and See more +
Marita A. Makinen, Chair of the firm’s Mergers & Acquisitions practice and co-Chair of the Transactions & Advisory Group, and Ken Fishkin, CISSP, CIPP/US, CIPM, CIPT, Manager of Information Security at Lowenstein Sandler, discuss the importance of complying with cybersecurity regulations within the context of mergers and acquisitions. Using the CafePress-Snapfish data breach case as an example, they explain how data privacy and data security can impact M&A transactions, particularly when the companies involved are consumer-facing and handle large volumes of sensitive personal data, such as financial services, healthcare, ad tech, and online retail businesses. They also address pre-closing issues that can lead to liabilities, due diligence, and what buyers or sellers should do in case of a breach.
Speakers:
Marita A. Makinen, Partner; Chair, Mergers & Acquisitions; co-Chair, Transactions & Advisory Group
Ken Fishkin, CISSP, CIPP/US, CIPM, CIPT, Manager of Information Security
Download video resource: https://www.lowenstein.com/news-insights/videos-listing/cyber-breaches-in-ma-transactions
Lowenstein Sandler Cybersecurity Awareness Series
Kathleen A. McGee, partner in the firm’s Tech Group and White Collar Criminal Defense practice, and Ken Fishkin, manager of information security, share what you need to know to protect your organization’s information, how to prepare your company for the possibility of various data breaches, the most common points of entry for intruders, and other cybersecurity concerns that every organization should be aware of. See less -