Skip to main content

Mergers and Acquisitions Security

Corporate Restructuring and Security Management

  • 1st Edition - April 18, 2005
  • Latest edition
  • Authors: Edward Halibozek, Gerald L. Kovacich
  • Language: English

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly… Read more

Data Mining & ML

Unlock the cutting edge

Up to 20% on trusted resources. Build expertise with data mining, ML methods.

Description

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.

Key features

- First book available that focuses on the role of the Security Manager in M&A - Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do - Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions - Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition

Readership

Chief Security Officers (CSO's), security managers and security staff involved in a merger oracquisition, Information System Security Officers (ISSO's) and computer security professionalsinvolved in a merger or acquisition, private security consultants. Corporate Executives, HR Managers.

Table of contents

What Are Mergers and Acquisitions (M&A)?; The Current Global Business Environment. Is it Merger and Acquisition Friendly?; The Role of Security in Mergers and Acquisitions; Gathering Information and Producing Corporate Intelligence; Why Pre-Merger and Acquisition Support? Protecting the effort; Security for the Due Diligence Assessment; Post Merger Security - short term; Post Merger Support - Long Term; Divestitures; The Future of Mergers and Acquisitions Security.

Review quotes

"With great detail, Mergers and Acquisitions Security walks the security manager and his or her department through the processes that require security expertise to protect the assets of the corporation...the book is a "must read"for owners of security and private investigation agencies, as it clearly outlines how they can best protect their company or any other company involved in the process...where corporate security managers can prove their worth and existence to the corporate staff...The authors approach will assist security executives in staying focused on the process while ensuring that all aspects of mergers, acquisitions and divestitures being considered by the company, whether friendly or hostile, are measured and well thought-out in advance."—P.I. Magazine (Professional Investigator), Oct-Nov 2006

"The value of Mergers and Acquisitions Security comes in its section on the uses and challenges of personnel protection (your M&A team members may experience personal risk, and dealing with this risk effectively is necessary if they are to do their work). The authors do a good job of identifying and explaining what you can expect from the protector and the protected…."—TechTarget.com

Product details

  • Edition: 1
  • Latest edition
  • Published: April 18, 2005
  • Language: English

About the authors

EH

Edward Halibozek

Edward Halibozek is currently a security consultant and part-time instructor for California State University, Fullerton. He retired from Northrop Grumman Corporation in August, 2011 after more than 26 years with the company. His most recent position was the Vice President of Security. Mr. Halibozek chaired the Northrop Grumman Security Council, which is the company’s key deliberative body for security, contingency planning, investigations and fire services. He was also responsible for Executive Protection services. Mr. Halibozek served as a member of the National Industrial Security Program Policy Advisory Council (NISPAC). Mr. Halibozek holds a Master of Science degree in Criminal Justice from California State University and an MBA from Pepperdine University.
Affiliations and expertise
Part-time instructor, California State University, Fullerton, CA, USA

GK

Gerald L. Kovacich

Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.
Affiliations and expertise
Security consultant, lecturer, and author, Oak Harbor, WA, USA