Cyber Security ​For Mergers and Acquisitions

Cyber security ​for M&A is no longer an option in today’s business world. ​​​​Let our ​M&A cyber security consulting team help!

​​Better Information​... Better Decisions.


Our team will conduct a thorough M&A due diligence risk assessment that measures ​​cyber security maturity. We then zero in on ​the most serious cyber security risks and deliver discrete recommendations ​on how to best reduce the risks and take control​.

lightbulb-o

​We ​Do ​An Assessment

Our ​consulting team will review all current security policies, procedures, and plans. We dig deep into the global network foot​print.

keyboard-o

​We ​Deliver Results​

We deliver an executive summary ​along with two reports that ​detail ​our findings and ​quantify security risk into actual dollar​s.

bolt

​​Decisions Are Made

​​With dollar quantifiable information ​in front of you, important decisions ​can be made to reduce the security risks that threaten your bottom line​​.

​And now for the technical stuff we do...


  • ​Device Discovery
  • ​Network Scans
  • ​Software Inventory
  • ​Account Inventory
  • ​Vulnerability Scans
  • ​Privilege Review
  • ​Domain Configuration
  • ​Network Infrastructure
  • ​Network Security
  • Social Engineering
  • ​Phishing (Email)
  • ​Study Previous ​Work
  • Incident Response Plans
  • Disaster Recovery Plans
  • Business Continuity Plans
  • Log Analysis
  • OWASP Top 10*
  • Training Records
  • ​​Configurations
  • Network and System Diagrams
  • Study Previous Audits
  • System Inventories
  • Instructions & Procedures
  • ​Global Network Foot

Our team of cyber security M&A consultants dig deep and find the information you will need to make good decisions.

​Company Leadership


​Our Leaders Have Decades of Experience


John Gerdes

John Gerdes

Chief Operating Officer

John Gerdes (CISSP, Associate HCISPP, GCED) has years of experience solving organization-level problems in cyber security risk management and regulatory compliance. John leads Secure Merger’s cyber risk assessments and compliance audits, breaking down organizations’ cyber risk.


Leighton Johnson

Leighton Johnson

Chief ​Security Officer

Leighton Johnson (CISSP, CISA, CISM, CIFI, CAS-CTR, CRISC, C|CISO, FITSP, ISSEP, ISSMP, CIOTP) has over 35 years experience in computer security, cyber security and software development. Specialties include: digital forensics, risk assessments, incident response team management and secure code reviews. Leighton leads the Secure Merger M&A team.

​We ​have the latest industry certifications.

  • ​​(​ISC)2 Certified Information Systems Security Professional (CISSP)
  • ​​(ISC)2 Certified Information Systems Security Management Professional (CISSP-ISSMP)
  • ​​(ISC)2 Certified Information Systems Security Engineering Professional (CISSP-ISSEP)
  • ​​​​(ISC)2 Healthcare Certified Information Security and Privacy Practitioner (HCISPP)
  • ​​ISACA Certified Information Systems Auditor (CISA)
  • ​​ISACA Certified Information Security Manager (CISM)
  • ​​ISACA Certified in Risk and Information Systems Control (CRISC)
  • ​​ISACA Cyber Security Fundamentals Certificate (CSX-F)
  • ​​ATAB Certified Anti-Terrorism Specialist-Cyber Terrorism Responder (CAS-CTR)
  • ​​GIAC Certified Incident Handler (GCIH)
  • ​​GIAC Certified Enterprise Defender (GCED)
  • ​​GIAC Security Essentials (GSEC)
  • ​​IISFA Certified Information Forensics Investigator (CIFI)
  • ​​​EC-Council Certified Chief Information Security Officer (C|CISO)
  • ​​EC-Council Certified Ethical Hacker (C|EH)
  • ​​EC-Council Computer Hacking Forensic Investigator (C|HFI)
  • ​​EC-Council Emergency Disaster Recovery Professional (E|DRP)
  • ​​Cisco Certified Network Associate Route & Switch (CCNA R&S)
  • ​​CompTIA Security+ CE
  • ​​CompTIA Network+ CE
  • ​​CompTIA A+ CE

Phone Call

​Contact ​Our M&A Cyber Security Team: