- This topic has 2 replies, 3 voices, and was last updated 12 hours, 31 minutes ago by .
Viewing 3 posts - 1 through 3 (of 3 total)
Viewing 3 posts - 1 through 3 (of 3 total)
- You must be logged in to reply to this topic.
What are the worst situations that a PMI can find itself and how to solve it? Let’s imagine for example that the DD haven’t been done properly and the acquire discover some discrepancies and financials challenges. How the acquire can react ?
I only have heard of worst cases never experienced it myself. One situation was that DD was insufficient and only discovered after the fact that the manufacturing site and product for a Ph1/2 trial could not be used. This was a major setback both financially and even more from a timeline perspective.
I’ve worked in M&A approximately 10 years performing DD & integration planning (typically pass off the high-level integration plan to a PM).
Worst situation examples:
1. Post-Close, plus 6 mos., the senior leaders of the acquired company leave. This outcome can be driven by not assessing the risks of hiring a cutting-edge Silicon Valley thought-leaders to join a (I’m being a bit brutal) stodgy Fortune 100 company and dealing with all the “red tape”, capped salaries, etc. They acquired leadership have HUGE expectations of uncapped earnings… and suddenly they’re in a company which has “tons” of processes, requirements, etc. In this specific case, we were able to lock up the IP, but the exit of the thought leaders was a big Negative.
How would I’ve done it differently? a.) kept them independent b.) better managed expectations of earnings potential (pay for performance) c.) managed corporate people who essentially say “it’s my way or the highway.
2. A Cybersecurity breach -or- incident Post-Close. Typically, post-Close, there is a window of time, especially when there’s a public announcement, when the target may be at enhanced risk from a Cybersecurity perspective when acquired by a major firm. Without going into detail,… there is risk if there’s a public announcement of an acquisition, but the target may have some cybersecurity risks. Secondly, in the case of carve-out, and when a transition services agreement is implemented with the parent company, the acquired company, and potentially the acquirer can be placed at risk based upon the cybersecurity incident against the selling parent company.
Trainings
© Institute for Mergers, Acquisitions and Alliances
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
In order to become a charterholder you need to complete one of the IMAA programs