16 SECURIT Y TECHNOLOGY E XECUTIVE • Februar y/March 2018 • www. SecurityInfoWatch.com
COVER STORY
W
hile most Corporate Security
Officers will tell you that no
two merger/acquisition sce-
narios are quite the same,
they do agree that there
are constants that provide
a thread throughout. The
risks range from the assimilation of corporate cul-
tures and integration of technology systems – both
physical and IT. And of course, there are the finan-
cial and compliance risks that occupy the C-Suite
during the entire process.
Because of the risk and security intricacies involved
in a large merger or acquisition, the CSO and senior
security team must assume multiple leading roles:
consultant, mentor, facilitator and arbitrator.
Between them, Scott Soltis, Director of Global
Security for Catalent Pharma Solutions, and Dan
Colin, Director of Global Security at Molson Coors
have more than 20 mergers/acquisitions under their
belt – and experience has taught them several les-
sons in the process itself. Here are five best practices
for integrating a security plan for a newly merged
or acquired company:
Five Steps to a
Risk-Free M&A;
CSOs Scott Soltis and Dan Colin share their keys to success
when it comes to creating a cohesive security plan among
newly integrated companies
By Steve Lask y