How to approach security management after a merger or acquisition
I'm looking for resources on information security guidelines or industry best
practices with respect to mergers and acquisitions (blending two companies'
information security policies). Finding good information on this subject has
been a significant challenge!
These sites may provide assistance. Research did not provide any specific
information, but I will continue to look!
This was first published in June 2001