Cyber resilience is an elevated and ever-evolving topic for private investors, including venture capitalists, and their portfolio companies. Threats include:
- Phishing
- Malware
- Ransomware
- Business and supply chain disruption
- Data privacy breaches
However, cybersecurity spending has slowed in some areas due to recession concerns and as companies prioritize spend in other areas, particularly growth.
EY Cybersecurity leaders shared trends and perspectives during a recent National Venture Capital Associations (NVCA) webinar to help companies learn how to identify cyber risks, particularly during merger and acquisition (M&A) activity, separations, integrations, and divestitures.
Cybersecurity is becoming an increasingly important, strategic priority for companies of all stages
Cybersecurity was once an afterthought, but now private investors and their portfolio companies are bringing it forward earlier, according to Stacy Scott, EY-Parthenon Technology and Cybersecurity Transactions Leader. Companies want to avoid business disruption and be prepared on day one with access management, security and controls.
Consumer data protection is under constant scrutiny. How data is collected, where it is stored and whether it is deleted properly carry risk and implications for companies. Today, for example, customers have direct access to their health information through portals, and they share data with companies for hyper-personalized services. With that comes the expectation that companies handle data properly. Otherwise, they may face fines, reputational damage and civil lawsuits from people whose data was mishandled or breached.
By building cybersecurity into your brand early on, you can use it to create customer trust, rather than looking at it as a cost center. “This gives consumers an increased level of trust and certainty that their data is being handled as a high priority,” said Brian DePersiis, EY US-East Cybersecurity Consulting Leader.
For manufacturing companies, particularly life sciences and biotechnology companies, operational technology is becoming a greater concern. Companies are looking at mitigating any potential harm by segregating operational technology (OT) and sensitive information from other areas of the business and corporate networks. Increasingly, systems are monitored by artificial intelligence, the Internet of Things (IoT) and edge computing devices, and while they do add efficiencies, those systems can also be disrupted.
Cybersecurity insurance premiums are increasing, and to qualify, companies will have to prove that they’re getting smarter about cybersecurity. “The bar has been raised,” Scott said. “Find out about the expectations. What do you have to have in place before they decide to cover your risk?”
One client recently sent a “cyber SWAT team” in post-close to assess IT and cybersecurity and get a complete view of information systems and controls. The assessment also helped shape the path of the corporate structure.
“We used to have the mindset, ‘protect the data,’” Scott said. “That’s still a mindset, but now it’s [also] ‘protect the system and detect suspicious and potentially malicious behavior.’ What attackers are looking to do is just to disrupt.”