How Cybersecurity Can Drive Value in M&A: Improving Processes and Outcome

Experts discussed how to account for cyber risks in M&A negotiations, including the cost of data breaches, the impact of buying a breach, the role of IT in creating M&A synergies, common mistakes, and more.


Event Recording 






Tom Craig

Managing Partner | FH+H

Tom leads FH+H's Corporate + Business Transactions team, which is a recognized leader in negotiated business transactions, particularly merger and acquisition deal-making. His clients have included domestic, foreign, public, and private companies of all sizes — from family-owned businesses to mid-size government contracting firms — at all stages in the business growth cycle. Tom also advises on breach of contract claims, violations of non-competition agreements, alleged trade violations, and more. He specializes in high-profile and high-risk matters that require comprehensive coordination of legal, media, political, and consulting efforts.


Richard P. Phillips

Senior Partner | Crossroads Capital, LLC

Richard is the Founder and Senior Partner of Crossroads Capital, LLC. He leads a team of experienced financial analysts, research assistants, and directors bringing the organization's tailored solutions to middle-market companies throughout the US and around the world. He is a seasoned dealmaker and accomplished financial analyst with more than 20 years of corporate finance, consulting, and investment banking experience. During his career, he has completed more than 29 M&A and other strategic transactions valued at more than $6.4 billion, across several industry sectors and geographic regions.


Bill Palifka

VP of Business Development | EmberSec

EmberSec, owned by By Light, is a leading cybersecurity operations team focused on the development of advanced cybersecurity measures to protect the commercial market. The team is made up of analysts and operators with expertise in the fields of Threat Emulation and Security Infrastructure Development, with a unique specialization in cyber risk analysis. The team offers a variety of technical and managed services that includes: 1. Vulnerability Assessments, 2. Cyber Due Diligence Assessments, 3. Penetration Testing, 4. Threat Simulation, 5. Threat Emulation, 6. Red Teaming, 7. Security Controls Validation, 8. Exercise Support, 9. Advisory & Compliance Assessments (HiTrust), 10. Managed Detection & Response, and 11. Continuous Monitoring.

Let's Talk

Do you have questions, comments or just want more information? We would love to hear from you.

Contact Form

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.