{"id":7169,"date":"2018-11-06T09:35:59","date_gmt":"2018-11-06T08:35:59","guid":{"rendered":"https:\/\/news.save.ch\/?p=7169"},"modified":"2023-03-14T08:56:51","modified_gmt":"2023-03-14T07:56:51","slug":"ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/","title":{"rendered":"Les transactions de fusion et d'acquisition : Cybers\u00e9curit\u00e9 - le danger sous-estim\u00e9"},"content":{"rendered":"<figure id=\"attachment_7170\" aria-describedby=\"caption-attachment-7170\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7170 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg\" alt=\"Fusions et acquisitions\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-7170\" class=\"wp-caption-text\">La s\u00e9curit\u00e9 informatique a-t-elle \u00e9t\u00e9 examin\u00e9e \u00e0 la loupe lors de cette op\u00e9ration de fusion et d'acquisition ? \u00a9 depositphotos, SergeyNivens<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Lorsqu'une op\u00e9ration de fusion et d'acquisition (M&amp;A) est sur le point d'\u00eatre conclue, les conditions \u00e9conomiques, juridiques, fiscales et financi\u00e8res d'une entreprise sont certes examin\u00e9es en d\u00e9tail lors de l'examen de due diligence. Mais ce qui est souvent sous-estim\u00e9 : Il convient d'accorder une importance tout aussi grande \u00e0 l'examen de la s\u00e9curit\u00e9 informatique. Les cyber-risques peuvent r\u00e9duire drastiquement la valeur marchande d'une entreprise et m\u00eame \u00eatre la raison de l'\u00e9chec d'une fusion.<\/p>\n<p>Si les donn\u00e9es des clients ne sont pas suffisamment prot\u00e9g\u00e9es, les fuites de donn\u00e9es ne nuisent pas seulement durablement \u00e0 la r\u00e9putation des entreprises, mais aussi \u00e0 leurs actifs. Ainsi, apr\u00e8s le scandale des donn\u00e9es de Cambridge Analytica, Facebook a perdu plus de 50 milliards de dollars en valeur \u00e0 la bourse.<\/p>\n<p>Il ne faut pas non plus sous-estimer le fait qu'apr\u00e8s l'entr\u00e9e en vigueur du nouveau r\u00e8glement sur la protection des donn\u00e9es en mai 2018, il faut s'attendre \u00e0 des amendes consid\u00e9rables en cas de non-respect des directives.<\/p>\n<p><strong>Les transactions M&amp;A peuvent \u00eatre \u00e0 l'origine de cyber-attaques<\/strong><\/p>\n<p>Si la transaction est men\u00e9e \u00e0 bien apr\u00e8s une \u00e9valuation intensive des risques, la s\u00e9curit\u00e9 de l'information reste toutefois un point critique, \u00e0 savoir lors de la fusion des infrastructures informatiques des entreprises.<\/p>\n<p>L'acquisition d'une entreprise ajoute des centaines, voire des milliers de nouveaux appareils de diff\u00e9rents fabricants \u00e0 l'architecture existante - il en r\u00e9sulte un r\u00e9seau complexe et confus qui pose de nouveaux d\u00e9fis aux Chief Information Security Officer (CISO). Les \u00e9ventuelles failles de s\u00e9curit\u00e9 doivent \u00eatre identifi\u00e9es et corrig\u00e9es imm\u00e9diatement.<\/p>\n<p>Il en va de m\u00eame lors d'un d\u00e9sinvestissement - la s\u00e9paration de syst\u00e8mes informatiques int\u00e9gr\u00e9s peut faire appara\u00eetre des menaces totalement inconnues. Le processus de s\u00e9paration peut prendre des mois, voire des ann\u00e9es. Il est donc essentiel d'\u00e9laborer une strat\u00e9gie de s\u00e9curit\u00e9 globale pour la phase de transition.<\/p>\n<p><strong>La protection par pare-feu, la s\u00e9curit\u00e9 du r\u00e9seau et la gestion des vuln\u00e9rabilit\u00e9s sont essentielles. <\/strong><\/p>\n<p>Quel que soit le stade auquel se trouve l'entreprise : Pour pouvoir lutter efficacement contre les cyber-attaques et utiliser les ressources de mani\u00e8re optimale, il faut une solution automatis\u00e9e. L'\u00e9valuation des cyber-risques ne doit pas se baser sur la perception subjective des diff\u00e9rents collaborateurs, mais sur la mise en \u0153uvre de r\u00e8gles de s\u00e9curit\u00e9 strictes.<\/p>\n<p>Un mod\u00e8le de r\u00e9seau qui visualise l'architecture existante aide \u00e0 identifier et \u00e0 combattre imm\u00e9diatement les menaces ainsi que les points faibles. Les modifications apport\u00e9es \u00e0 la structure du r\u00e9seau devraient \u00eatre test\u00e9es au pr\u00e9alable dans un environnement virtuel afin d'\u00e9conomiser du temps et de l'argent. Un tel mod\u00e8le de r\u00e9seau permet \u00e9galement de simuler des cyber-attaques afin de tester l'efficacit\u00e9 des protocoles de s\u00e9curit\u00e9 et des pare-feux.<\/p>\n<p>Les RSSI et les directeurs financiers ne se pr\u00e9occupent jamais assez t\u00f4t des cyber-risques dans le cadre des fusions et acquisitions. Ils devraient \u00eatre impliqu\u00e9s d\u00e8s le d\u00e9but, car une attention et des investissements pr\u00e9coces dans la s\u00e9curit\u00e9 informatique cr\u00e9ent la base d'une fusion d'entreprises r\u00e9ussie sans flancs de s\u00e9curit\u00e9 ouverts.<\/p>\n<p><em>J\u00f6rg von der Heydt, Channel Director DACH chez <a href=\"https:\/\/www.skyboxsecurity.com\/DACH\">Skybox S\u00e9curit\u00e9 <\/a><\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Steht ein Mergers &amp; Acquisitions(M&amp;A)-Deal an, werden bei der Due-Diligence-Pr\u00fcfung zwar die wirtschaftlichen, rechtlichen, steuerlichen und finanziellen Verh\u00e4ltnisse eines Unternehmens genauestens beleuchtet. Was jedoch oft untersch\u00e4tzt wird: Der Pr\u00fcfung der IT-Sicherheit sollte ebenso grosse Bedeutung beigemessen werden. Cyber-Risiken k\u00f6nnen den Marktwert eines Unternehmens drastisch mindern und sogar Grund f\u00fcr das Scheitern einer Fusion sein. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":7170,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[62,63,410],"class_list":["post-7169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-ict-sicherheit","tag-it-security","tag-mergers-acquisitions"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Mergers & Acquisitions","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>M&amp;A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr - Save<\/title>\n<meta name=\"description\" content=\"Ob Akquisition oder Ausgliederung von Unternehmensanteilen, nicht selten wird bei solchen Gesch\u00e4ftsabschl\u00fcssen die IT-Sicherheit ausser Acht gelassen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M&amp;A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr - Save\" \/>\n<meta property=\"og:description\" content=\"Ob Akquisition oder Ausgliederung von Unternehmensanteilen, nicht selten wird bei solchen Gesch\u00e4ftsabschl\u00fcssen die IT-Sicherheit ausser Acht gelassen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-06T08:35:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"M&#038;A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr\",\"datePublished\":\"2018-11-06T08:35:59+00:00\",\"dateModified\":\"2023-03-14T07:56:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/\"},\"wordCount\":469,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Depositphotos_70633937_m-2015.jpg\",\"keywords\":[\"ICT-Sicherheit\",\"IT-SECURITY\",\"Mergers &amp; Acquisitions\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/\",\"name\":\"M&A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Depositphotos_70633937_m-2015.jpg\",\"datePublished\":\"2018-11-06T08:35:59+00:00\",\"dateModified\":\"2023-03-14T07:56:51+00:00\",\"description\":\"Ob Akquisition oder Ausgliederung von Unternehmensanteilen, nicht selten wird bei solchen Gesch\u00e4ftsabschl\u00fcssen die IT-Sicherheit ausser Acht gelassen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Depositphotos_70633937_m-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Depositphotos_70633937_m-2015.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Wurde bei diesem M&A-Deal auch die IT-Sicherheit unter die Lupe genommen? \u00a9 depositphotos, Sergey Nivens\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"M&#038;A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les transactions de fusion et d'acquisition : Cybers\u00e9curit\u00e9 - le danger sous-estim\u00e9 - Save","description":"Qu'il s'agisse d'acquisitions ou de cessions de parts d'entreprises, il n'est pas rare que la s\u00e9curit\u00e9 informatique soit n\u00e9glig\u00e9e lors de telles transactions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/","og_locale":"fr_FR","og_type":"article","og_title":"M&A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr - Save","og_description":"Ob Akquisition oder Ausgliederung von Unternehmensanteilen, nicht selten wird bei solchen Gesch\u00e4ftsabschl\u00fcssen die IT-Sicherheit ausser Acht gelassen.","og_url":"https:\/\/news.save.ch\/fr\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/","og_site_name":"Save","article_published_time":"2018-11-06T08:35:59+00:00","article_modified_time":"2023-03-14T07:56:51+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"M&#038;A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr","datePublished":"2018-11-06T08:35:59+00:00","dateModified":"2023-03-14T07:56:51+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/"},"wordCount":469,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg","keywords":["ICT-Sicherheit","IT-SECURITY","Mergers &amp; Acquisitions"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/","url":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/","name":"Les transactions de fusion et d'acquisition : Cybers\u00e9curit\u00e9 - le danger sous-estim\u00e9 - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg","datePublished":"2018-11-06T08:35:59+00:00","dateModified":"2023-03-14T07:56:51+00:00","description":"Qu'il s'agisse d'acquisitions ou de cessions de parts d'entreprises, il n'est pas rare que la s\u00e9curit\u00e9 informatique soit n\u00e9glig\u00e9e lors de telles transactions.","breadcrumb":{"@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/11\/Depositphotos_70633937_m-2015.jpg","width":1000,"height":667,"caption":"Wurde bei diesem M&A-Deal auch die IT-Sicherheit unter die Lupe genommen? \u00a9 depositphotos, Sergey Nivens"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/ma-transaktionen-cybersicherheit-die-unterschaetzte-gefahr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"M&#038;A-Transaktionen: Cybersicherheit \u2013 die untersch\u00e4tzte Gefahr"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=7169"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7169\/revisions"}],"predecessor-version":[{"id":17424,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7169\/revisions\/17424"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/7170"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=7169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=7169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=7169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}