[1]The story of Mary:
Mary spent a lot of time on the phone speaking with her CEO, general
counsel, CFO and other business leaders in her company and at those
she was evaluating for purchase. "A good deal doesn't get done on
email" she was fond of telling her co-workers. And it was true. So
as Mary was waiting on her delayed flight to board at Newark
International Airport one day, she decided to squeeze in one more
call to try and finalize the terms of a merger that was coming
together between her company and a competitor. What Mary didn't
consider, as she was singularly focused on that conversation, was
that she wasn't alone in her conversation. Sitting near her, and
listening to every word she said, was a financial reporter from a
well-known business website. He put two and two together pretty
easily. The pending merger would not be a secret for long.
You can use your imagination to guess what happened next. Story of
the pending merger, which Mary had finalized on the call that day,
broke online within 24 hours. Investors and speculators climbed all
over the stocks of both companies and the fallout drastically
changed the financial dynamics, effectively killing the deal. In the
end, Mary's company calculated that the failed merger attempt cost
them $12 million, not to mention the lost market opportunity and
value that the merger would have created. No one was ever able to
tie the leak directly to Mary, but since there were so few people
involved in the negotiations there were assumptions made. Mary's
career stalled after that.
(Via [2]CSO Online)
I've talked before about my role in defending against outsiders
learning about potential Mergers & Acquisition targets of a former
employer. So much around this is old-school physical security and
OpSec. It is challenging but fun work - very cloak and dagger.
The article is a nice reminder that all of your security budget going
toward shiny boxes and cool services doesn't protect against this very
real risk scenario.
Also on:
[3]Twitter
__________________________________________________________________
My original entry is here: [4]The story of Mary. It posted Wed, 27 Jun
2018 20:31:57 +0000.
Filed under: business,
References
1.
https://www.csoonline.com/article/3283331/security/the-story-of-mary.html#tk.rss_all
2.
http://www.csoonline.com/index.rss
3.
https://twitter.com/TokyoGringo/status/1012072122322219008
4.
https://www.prjorgensen.com/?p=1235