SlideShare a Scribd company logo
CHRIS STAFFORD
Senior Manager,
Mergers & Acquisitions
West Monroe Partners
The State of Open Source
in M&A Transactions
PAUL COTTER
Senior Architect,
Cybersecurity
West Monroe Partners
© 2019 Synopsys, Inc. 2
© 2019 Synopsys, Inc.2
Synopsys Confidential Information
© 2019 Synopsys, Inc.2
Three critical trends
OSS management should
fit into a broader security
program
Sellers need to be prepared
well in advance of a
transaction
Buyers are becoming more
focused and sophisticated
during a transaction
© 2019 Synopsys, Inc. 3
© 2019 Synopsys, Inc.3
Synopsys Confidential Information
About West Monroe Partners
O U R G L O B A L N E T W O R K S O F T W A R E & H I G H - T E C H A D V I S O R S
CARVE OUT READINESS & EXECUTION
DUE DILIGENCE
SELL-SIDE READINESS
MERGER INTEGRATION
VALUE CREATION
NORTH AMERICA
GLOBAL
NETWORK
LATIN AMERICA
EMEA & ASIA
GROWTH STRATEGY
OPS TRANSFORMATION
CUSTOMER SUCCESS
PRODUCT/R&D
IT/OPS/CYBER
© 2019 Synopsys, Inc. 4
© 2019 Synopsys, Inc.4
Synopsys Confidential Information
Over LTM, West Monroe advised on 450 transactions, 150 software transactions,
and directly advised over 75 PE-backed software portfolio companies
Aerospace + Defense
Banking + Insurance
Business Products + Services
Capital Markets + Trading
Education
Energy + Utilities
Food + Food Distribution
Healthcare + Life Sciences
High Tech + Software
Manufacturing + Distribution
Private Equity + Alternative Investments
Professional Services
Public Services
Real Estate
Retail
Telecommunications + Media
OtherHIGH TECH
& SOFTWARE
MANUFACTURING
& DISTRIBUTION
HEALTHCARE &
LIFE SCIENCES
© 2019 Synopsys, Inc. 5
© 2019 Synopsys, Inc.5
Synopsys Confidential Information
© 2019 Synopsys, Inc.5
OSS management & DevSecOps
© 2019 Synopsys, Inc. 6
© 2019 Synopsys, Inc.6
Synopsys Confidential Information
While an OSS audit in diligence is important, ongoing license
governance is more impactful in the long term
WHAT IT IS AND DOES
◆ Occurs in an ongoing manner
(OpEx investment)
◆ Helps identify licenses being used or
modified incorrectly
◆ Gives a buyer historical evidence of a
continuous process to monitor and
remediate licensing issues
WHAT IT DOES NOT DO
◆ Predict license compliance in the future
◆ Prevent misuse or developer mistakes
WHAT IT IS AND DOES
◆ Occurs at a point in time
◆ Looks for known license/security weaknesses
◆ Checks off box for compliance
◆ Gives a buyer assurances at a single point in
time
WHAT IT DOES NOT DO
◆ Evaluate how a company prevents new
licenses from being misused
◆ Predict license compliance in the future
One-time OSS audit Ongoing OSS governance program
© 2019 Synopsys, Inc. 7
© 2019 Synopsys, Inc.7
Synopsys Confidential Information
Software
developers
Tech leadership
Management
team
Aware that OSS exists ü ü ü
Knows where to find it ü
Knows how to use it ü ü
Knows when to seek out counsel ü ü
Aware of the risks associated with OSS use ü ü ü
Knows how OSS fits into the company’s
business strategy
ü ü
Monitored as a part of IT governance ü
To limit liability, each role in the organization must be aware of roles
and responsibilities of using OSS
© 2019 Synopsys, Inc. 8
© 2019 Synopsys, Inc.8
Synopsys Confidential Information
The move to DevSecOps involves Operations and Security as
integrated parts of each stage in the product life cycle, enabling
holistic security
Traditional DevOps
DevSecOps
Dev Sec Ops
© 2019 Synopsys, Inc. 9
© 2019 Synopsys, Inc.9
Synopsys Confidential Information
• Capitalizes on security and
operations involvement across all
product/feature stages
• Leverages security tools and
processes
• Moves security from a stage gate to
an integrated part of the process
• Implements consistency across
delivery teams
A holistic approach embeds security and operations within all
phases of the product life cycle
DevSecOps
Plan
Create
Verify
Package
Release
& Deploy
Operate &
Monitor
Security
Training
Secure
Design
Secure
Coding
Static
Analysis
Dynamic
Analysis
Attack
Surface
Check (inc.
OSS)
Final
Review
Code
Signing
Incident
Response
Plan
Testing &
Scanning
Monitor
Logs &
Apps
Change
Mgmt.
© 2019 Synopsys, Inc. 10
© 2019 Synopsys, Inc.10
Synopsys Confidential Information
HOW HAVE MOST MID-MARKET TECH COMPANIES HANDLED THIS TO DATE?
We see distinct differences in DevSecOps based on a company’s
strategy
✕ No holistic approach
✕ No dedicated department/staff
✕ Inconsistent application of
processes and tools
✕ Point application of security
practices (usually ineffective)
Less than 30% of companies we see have a
DevSecOps strategy across their products and platforms
INCOMPLETE/INCONSISTENT
APPROACH TO DELIVERY
✓ An end-to-end view of delivery
✓ Clearly defined metrics and
measures
✓ Buy-in from management on the
importance of and need for
consistency
✓ Continuous security monitoring and
testing
DEFINED, HOLISTIC
DELIVERY STRATEGY
© 2019 Synopsys, Inc. 11
© 2019 Synopsys, Inc.11
Synopsys Confidential Information
© 2019 Synopsys, Inc.11
Seller preparation
© 2019 Synopsys, Inc. 12
© 2019 Synopsys, Inc.12
Synopsys Confidential Information
Most middle-market software companies have immature
or no governance processes related to OSS
◆ Performed at the end of
the SDLC
◆ High effort
◆ Low accuracy /
thoroughness
◆ Dependent on developers
◆ Difficult to maintain
◆ Not usually the source of
truth
◆ Periodic scans / audits
◆ Labor intensive
◆ Not scalable (>11 new
vulns/day)
MANUAL
REVIEWS
SPREADSHEET
INVENTORY
VULNERABILITY
DETECTION & TRACKING
© 2019 Synopsys, Inc. 13
© 2019 Synopsys, Inc.13
Synopsys Confidential Information
• Conduct a third-party audit and risk assessment of the platform(s) for vulnerabilities, unused
components/code, and third-party code without known licenses
• Develop and execute a roadmap for comprehensive secure SDLC processes, including:
– OSS governance model
– Education of engineering team and implementation of governance processes
– Establish SDLC KPIs, measure, track, and trend
• Remediate known issues identified in audit and document progress/improvements
One year out from a transaction, sellers can take significant steps to
improve their posture and demonstrate improvement
12 MONTHS 6 MONTHS 1 MONTH
© 2019 Synopsys, Inc. 14
© 2019 Synopsys, Inc.14
Synopsys Confidential Information
• Ensure documentation and policy is consistent with processes and adjust as necessary
• Conduct internal OSS audit if last review is more than 6 months old
• Adjust or define roadmaps as needed to reflect current state (delays/changes)
• Prepare materials/documentation/positioning for due diligence
Six months allows sellers to address some gaps but not
fundamentally alter maturity
12 MONTHS 6 MONTHS 1 MONTH
© 2019 Synopsys, Inc. 15
© 2019 Synopsys, Inc.15
Synopsys Confidential Information
• Produce historical update / remediation reports
• Review process documentation
• Produce change logs from full scan (if completed earlier)
• Prepare for OSS audit during diligence (such as removing unused OSS component artifacts)
• Educate key team members (including management team) on OSS posture, secure SLDC
gaps/posture, and how to discuss any potential buyer concerns
If a transaction is imminent, sellers have little time to make
adjustments but can prepare for the diligence process
12 MONTHS 6 MONTHS 1 MONTH
© 2019 Synopsys, Inc. 16
© 2019 Synopsys, Inc.16
Synopsys Confidential Information
© 2019 Synopsys, Inc.16
Buyer sophistication
© 2019 Synopsys, Inc. 17
© 2019 Synopsys, Inc.17
Synopsys Confidential Information
The market for tech isn’t slowing down; in the first half of 2019, TMT
is still dominating, with 42% more transactions than the second-
busiest sector
622TMT
439Industrials + Chemicals
352Business Services
282Pharma, Medical, and Biotech
225Financial Services
208Consumer
151Energy, Mining, + Utilities
77
72
60
Construction
Transportation
Leisure
Real Estate 19
15
9
US M&A SECTORS BY VOLUME, H1 2019
Agriculture
Defense
© 2019 Synopsys, Inc. 18
© 2019 Synopsys, Inc.18
Synopsys Confidential Information
Add-on acquisitions can drive rapid growth through cross-sell,
expansion into new markets, and enable more mature functional
integrations
◆ Operating flexibility of SaaS
companies
◆ Acquiring the right products and
services is always a quicker
approach
◆ The “buy and build” strategy
CONTRIBUTING FACTORS
2016
47% 61%
2007
% OF ADD-ONS AMONG
TOTAL SOFTWARE DEAL
COUNT
© 2019 Synopsys, Inc. 19
© 2019 Synopsys, Inc.19
Synopsys Confidential Information
Buyers are becoming more focused and sophisticated during a
transaction process
Speed is a differentiator
for buyers
Buyers have less tolerance
for unknown product risks
Buyers have high
expectations and will
demand precision pre-close
© 2019 Synopsys, Inc. 20
© 2019 Synopsys, Inc.20
Synopsys Confidential Information
Buyers will holistically evaluate OSS in diligence
• Via West Monroe or other
third party
• Will review audit output to
help interpret findings
• Will evaluate risks /
remediation paths with
legal diligence provider
• Via Black Duck or other
third party
• Requires 1–3 weeks’
duration, plus
review/explanation time
with third parties and
buyers
• Via third-party legal
advisors
• Will review audit output to
evaluate and measure
risks
• Will advise buyer on
remediation needed, reps
& warranties needs, and
closing conditions
OSS AUDIT TECH DILIGENCE LEGAL DILIGENCE
© 2019 Synopsys, Inc. 21
© 2019 Synopsys, Inc.21
Synopsys Confidential Information
A CAUTIONARY TALE
Diligence of a remote management and security tool company
Conducted one-time OSS audit
Licensing issues identified
◆ 100+ license concerns
◆ Most concerns related to OSS that
was redistributed on Target’s
appliances
SITUATION
◆ Line-by-line investigation and root-
cause analysis
◆ Multiple hours spent on calls with
WMP, legal counsel, Black Duck,
buyer and seller
ACTION
Root cause
◆ 80%+ of issues related to Linux
distribution source code in the code
tree
◆ Most modifications to source were
being contributed back to the OSS
community
Lessons learned
◆ Careful scoping of scans is
necessary to avoid expensive and
exhausting meetings (delayed
transaction close, fees to advisors)
◆ Source code hygiene can help
prevent issues
RESULTS
© 2019 Synopsys, Inc. 22
© 2019 Synopsys, Inc.22
Synopsys Confidential Information
A DELAYED DEAL
Diligence of a SaaS / on-prem software company
Conducted one-time OSS audit
Licensing issues identified
◆ The Target company had improperly
modified and deployed an OSS
component within their software
package
◆ The improperly modified code had
been included in legacy distributed
versions of the product, limiting the
company’s ability to upgrade
customers to a more recent version
SITUATION
◆ Completed Black Duck audit
◆ Legal advisors conducted research
on the license’s copyright owner to
evaluate potential outcomes
◆ Identified several “best” and “worst”
case scenarios and evaluated
actions required by Target prior to
close
ACTION
Outcomes
◆ Target required to remediate issue
and execute necessary deployments
prior to close (delayed deal closing)
◆ Modified reps & warranties and
advised on explanation for future
buyers
Lessons learned
◆ Lack of OSS insight can delay a
transaction
◆ A distributed codebase can lead to
ongoing licensing concerns
RESULTS
Thank You

More Related Content

PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Webinar–That is Not How This Works
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Webinar–Using Evidence-Based Security
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–That is Not How This Works
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Webinar–Best Practices for DevSecOps at Scale
Webinar–Using Evidence-Based Security
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–5 ways to risk rank your vulnerabilities
Webinar–Financial Services Study Shows Why Investing in AppSec Matters

What's hot (18)

PDF
Webinar–Delivering a Next Generation Vulnerability Feed
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–The 2019 Open Source Year in Review
PDF
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Webinar – Risk-based adaptive DevSecOps
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar – Security Tool Misconfiguration and Abuse
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PDF
Open Source Outlook: Expected Developments for 2016
PPTX
Securing and automating your application infrastructure meetup 23112021 b
PPTX
Black Duck & IBM Present: Application Security in the Age of Open Source
PDF
Webinar–2019 Open Source Risk Analysis Report
PDF
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–What You Need To Know About Open Source Licensing
Webinar–The 2019 Open Source Year in Review
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar – Risk-based adaptive DevSecOps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Open Source Outlook: Expected Developments for 2016
Securing and automating your application infrastructure meetup 23112021 b
Black Duck & IBM Present: Application Security in the Age of Open Source
Webinar–2019 Open Source Risk Analysis Report
Webinar–Open Source Risk in M&A by the Numbers
Ad

Similar to Webinar–The State of Open Source in M&A Transactions (20)

PDF
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
Flight East 2018 Presentation–You've got your open source audit report, now w...
PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PDF
Identifying Code Risks in Software M&A
PPTX
Four Steps to Creating an Effective Open Source Policy
PPTX
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
PPTX
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
PDF
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
PPT
Ten Elements of Open Source Governance
PPTX
'A brief introduction to the impact of open source software on M&A and other ...
PDF
Temple-Graff-1up.pdf IAITAM1 IAITAM1IAITAM1
PDF
2019 InfoSec Buyer's Guide
PPTX
Automate and Enhance Application Security Analysis
PPTX
Automate and Enhance Application Security Analysis
PDF
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
PPTX
The Role of In-House & External Counsel in Managing Open Source Software
PPTX
Open Source 360 Survey Results
PPTX
ACC M&A Dec V5
PPTX
App store and SAM strategy
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Identifying Code Risks in Software M&A
Four Steps to Creating an Effective Open Source Policy
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Ten Elements of Open Source Governance
'A brief introduction to the impact of open source software on M&A and other ...
Temple-Graff-1up.pdf IAITAM1 IAITAM1IAITAM1
2019 InfoSec Buyer's Guide
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
The Role of In-House & External Counsel in Managing Open Source Software
Open Source 360 Survey Results
ACC M&A Dec V5
App store and SAM strategy
Ad

More from Synopsys Software Integrity Group (9)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar – Software Security 2019–Embrace Velocity
PDF
Webinar - Developers Are Your Greatest AppSec Resource
PDF
Webinar – Using Metrics to Drive Your Software Security Initiative
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PDF
Webinar–AppSec: Hype or Reality
PDF
Infographic–A Look Back at the First Year of GDPR
PPTX
Webinar–Reviewing Modern JavaScript Applications
Webinar–Segen oder Fluch?
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar – Software Security 2019–Embrace Velocity
Webinar - Developers Are Your Greatest AppSec Resource
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–AppSec: Hype or Reality
Infographic–A Look Back at the First Year of GDPR
Webinar–Reviewing Modern JavaScript Applications

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Nekopoi APK 2025 free lastest update
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
top salesforce developer skills in 2025.pdf
PPTX
Transform Your Business with a Software ERP System
PDF
Digital Strategies for Manufacturing Companies
PPTX
Online Work Permit System for Fast Permit Processing
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
System and Network Administration Chapter 2
PDF
medical staffing services at VALiNTRY
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
Internet Downloader Manager (IDM) Crack 6.42 Build 41
VVF-Customer-Presentation2025-Ver1.9.pptx
Understanding Forklifts - TECH EHS Solution
Nekopoi APK 2025 free lastest update
Design an Analysis of Algorithms I-SECS-1021-03
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
How to Choose the Right IT Partner for Your Business in Malaysia
Odoo Companies in India – Driving Business Transformation.pdf
top salesforce developer skills in 2025.pdf
Transform Your Business with a Software ERP System
Digital Strategies for Manufacturing Companies
Online Work Permit System for Fast Permit Processing
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
System and Network Administration Chapter 2
medical staffing services at VALiNTRY
PTS Company Brochure 2025 (1).pdf.......
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Design an Analysis of Algorithms II-SECS-1021-03

Webinar–The State of Open Source in M&A Transactions

  • 1. CHRIS STAFFORD Senior Manager, Mergers & Acquisitions West Monroe Partners The State of Open Source in M&A Transactions PAUL COTTER Senior Architect, Cybersecurity West Monroe Partners
  • 2. © 2019 Synopsys, Inc. 2 © 2019 Synopsys, Inc.2 Synopsys Confidential Information © 2019 Synopsys, Inc.2 Three critical trends OSS management should fit into a broader security program Sellers need to be prepared well in advance of a transaction Buyers are becoming more focused and sophisticated during a transaction
  • 3. © 2019 Synopsys, Inc. 3 © 2019 Synopsys, Inc.3 Synopsys Confidential Information About West Monroe Partners O U R G L O B A L N E T W O R K S O F T W A R E & H I G H - T E C H A D V I S O R S CARVE OUT READINESS & EXECUTION DUE DILIGENCE SELL-SIDE READINESS MERGER INTEGRATION VALUE CREATION NORTH AMERICA GLOBAL NETWORK LATIN AMERICA EMEA & ASIA GROWTH STRATEGY OPS TRANSFORMATION CUSTOMER SUCCESS PRODUCT/R&D IT/OPS/CYBER
  • 4. © 2019 Synopsys, Inc. 4 © 2019 Synopsys, Inc.4 Synopsys Confidential Information Over LTM, West Monroe advised on 450 transactions, 150 software transactions, and directly advised over 75 PE-backed software portfolio companies Aerospace + Defense Banking + Insurance Business Products + Services Capital Markets + Trading Education Energy + Utilities Food + Food Distribution Healthcare + Life Sciences High Tech + Software Manufacturing + Distribution Private Equity + Alternative Investments Professional Services Public Services Real Estate Retail Telecommunications + Media OtherHIGH TECH & SOFTWARE MANUFACTURING & DISTRIBUTION HEALTHCARE & LIFE SCIENCES
  • 5. © 2019 Synopsys, Inc. 5 © 2019 Synopsys, Inc.5 Synopsys Confidential Information © 2019 Synopsys, Inc.5 OSS management & DevSecOps
  • 6. © 2019 Synopsys, Inc. 6 © 2019 Synopsys, Inc.6 Synopsys Confidential Information While an OSS audit in diligence is important, ongoing license governance is more impactful in the long term WHAT IT IS AND DOES ◆ Occurs in an ongoing manner (OpEx investment) ◆ Helps identify licenses being used or modified incorrectly ◆ Gives a buyer historical evidence of a continuous process to monitor and remediate licensing issues WHAT IT DOES NOT DO ◆ Predict license compliance in the future ◆ Prevent misuse or developer mistakes WHAT IT IS AND DOES ◆ Occurs at a point in time ◆ Looks for known license/security weaknesses ◆ Checks off box for compliance ◆ Gives a buyer assurances at a single point in time WHAT IT DOES NOT DO ◆ Evaluate how a company prevents new licenses from being misused ◆ Predict license compliance in the future One-time OSS audit Ongoing OSS governance program
  • 7. © 2019 Synopsys, Inc. 7 © 2019 Synopsys, Inc.7 Synopsys Confidential Information Software developers Tech leadership Management team Aware that OSS exists ü ü ü Knows where to find it ü Knows how to use it ü ü Knows when to seek out counsel ü ü Aware of the risks associated with OSS use ü ü ü Knows how OSS fits into the company’s business strategy ü ü Monitored as a part of IT governance ü To limit liability, each role in the organization must be aware of roles and responsibilities of using OSS
  • 8. © 2019 Synopsys, Inc. 8 © 2019 Synopsys, Inc.8 Synopsys Confidential Information The move to DevSecOps involves Operations and Security as integrated parts of each stage in the product life cycle, enabling holistic security Traditional DevOps DevSecOps Dev Sec Ops
  • 9. © 2019 Synopsys, Inc. 9 © 2019 Synopsys, Inc.9 Synopsys Confidential Information • Capitalizes on security and operations involvement across all product/feature stages • Leverages security tools and processes • Moves security from a stage gate to an integrated part of the process • Implements consistency across delivery teams A holistic approach embeds security and operations within all phases of the product life cycle DevSecOps Plan Create Verify Package Release & Deploy Operate & Monitor Security Training Secure Design Secure Coding Static Analysis Dynamic Analysis Attack Surface Check (inc. OSS) Final Review Code Signing Incident Response Plan Testing & Scanning Monitor Logs & Apps Change Mgmt.
  • 10. © 2019 Synopsys, Inc. 10 © 2019 Synopsys, Inc.10 Synopsys Confidential Information HOW HAVE MOST MID-MARKET TECH COMPANIES HANDLED THIS TO DATE? We see distinct differences in DevSecOps based on a company’s strategy ✕ No holistic approach ✕ No dedicated department/staff ✕ Inconsistent application of processes and tools ✕ Point application of security practices (usually ineffective) Less than 30% of companies we see have a DevSecOps strategy across their products and platforms INCOMPLETE/INCONSISTENT APPROACH TO DELIVERY ✓ An end-to-end view of delivery ✓ Clearly defined metrics and measures ✓ Buy-in from management on the importance of and need for consistency ✓ Continuous security monitoring and testing DEFINED, HOLISTIC DELIVERY STRATEGY
  • 11. © 2019 Synopsys, Inc. 11 © 2019 Synopsys, Inc.11 Synopsys Confidential Information © 2019 Synopsys, Inc.11 Seller preparation
  • 12. © 2019 Synopsys, Inc. 12 © 2019 Synopsys, Inc.12 Synopsys Confidential Information Most middle-market software companies have immature or no governance processes related to OSS ◆ Performed at the end of the SDLC ◆ High effort ◆ Low accuracy / thoroughness ◆ Dependent on developers ◆ Difficult to maintain ◆ Not usually the source of truth ◆ Periodic scans / audits ◆ Labor intensive ◆ Not scalable (>11 new vulns/day) MANUAL REVIEWS SPREADSHEET INVENTORY VULNERABILITY DETECTION & TRACKING
  • 13. © 2019 Synopsys, Inc. 13 © 2019 Synopsys, Inc.13 Synopsys Confidential Information • Conduct a third-party audit and risk assessment of the platform(s) for vulnerabilities, unused components/code, and third-party code without known licenses • Develop and execute a roadmap for comprehensive secure SDLC processes, including: – OSS governance model – Education of engineering team and implementation of governance processes – Establish SDLC KPIs, measure, track, and trend • Remediate known issues identified in audit and document progress/improvements One year out from a transaction, sellers can take significant steps to improve their posture and demonstrate improvement 12 MONTHS 6 MONTHS 1 MONTH
  • 14. © 2019 Synopsys, Inc. 14 © 2019 Synopsys, Inc.14 Synopsys Confidential Information • Ensure documentation and policy is consistent with processes and adjust as necessary • Conduct internal OSS audit if last review is more than 6 months old • Adjust or define roadmaps as needed to reflect current state (delays/changes) • Prepare materials/documentation/positioning for due diligence Six months allows sellers to address some gaps but not fundamentally alter maturity 12 MONTHS 6 MONTHS 1 MONTH
  • 15. © 2019 Synopsys, Inc. 15 © 2019 Synopsys, Inc.15 Synopsys Confidential Information • Produce historical update / remediation reports • Review process documentation • Produce change logs from full scan (if completed earlier) • Prepare for OSS audit during diligence (such as removing unused OSS component artifacts) • Educate key team members (including management team) on OSS posture, secure SLDC gaps/posture, and how to discuss any potential buyer concerns If a transaction is imminent, sellers have little time to make adjustments but can prepare for the diligence process 12 MONTHS 6 MONTHS 1 MONTH
  • 16. © 2019 Synopsys, Inc. 16 © 2019 Synopsys, Inc.16 Synopsys Confidential Information © 2019 Synopsys, Inc.16 Buyer sophistication
  • 17. © 2019 Synopsys, Inc. 17 © 2019 Synopsys, Inc.17 Synopsys Confidential Information The market for tech isn’t slowing down; in the first half of 2019, TMT is still dominating, with 42% more transactions than the second- busiest sector 622TMT 439Industrials + Chemicals 352Business Services 282Pharma, Medical, and Biotech 225Financial Services 208Consumer 151Energy, Mining, + Utilities 77 72 60 Construction Transportation Leisure Real Estate 19 15 9 US M&A SECTORS BY VOLUME, H1 2019 Agriculture Defense
  • 18. © 2019 Synopsys, Inc. 18 © 2019 Synopsys, Inc.18 Synopsys Confidential Information Add-on acquisitions can drive rapid growth through cross-sell, expansion into new markets, and enable more mature functional integrations ◆ Operating flexibility of SaaS companies ◆ Acquiring the right products and services is always a quicker approach ◆ The “buy and build” strategy CONTRIBUTING FACTORS 2016 47% 61% 2007 % OF ADD-ONS AMONG TOTAL SOFTWARE DEAL COUNT
  • 19. © 2019 Synopsys, Inc. 19 © 2019 Synopsys, Inc.19 Synopsys Confidential Information Buyers are becoming more focused and sophisticated during a transaction process Speed is a differentiator for buyers Buyers have less tolerance for unknown product risks Buyers have high expectations and will demand precision pre-close
  • 20. © 2019 Synopsys, Inc. 20 © 2019 Synopsys, Inc.20 Synopsys Confidential Information Buyers will holistically evaluate OSS in diligence • Via West Monroe or other third party • Will review audit output to help interpret findings • Will evaluate risks / remediation paths with legal diligence provider • Via Black Duck or other third party • Requires 1–3 weeks’ duration, plus review/explanation time with third parties and buyers • Via third-party legal advisors • Will review audit output to evaluate and measure risks • Will advise buyer on remediation needed, reps & warranties needs, and closing conditions OSS AUDIT TECH DILIGENCE LEGAL DILIGENCE
  • 21. © 2019 Synopsys, Inc. 21 © 2019 Synopsys, Inc.21 Synopsys Confidential Information A CAUTIONARY TALE Diligence of a remote management and security tool company Conducted one-time OSS audit Licensing issues identified ◆ 100+ license concerns ◆ Most concerns related to OSS that was redistributed on Target’s appliances SITUATION ◆ Line-by-line investigation and root- cause analysis ◆ Multiple hours spent on calls with WMP, legal counsel, Black Duck, buyer and seller ACTION Root cause ◆ 80%+ of issues related to Linux distribution source code in the code tree ◆ Most modifications to source were being contributed back to the OSS community Lessons learned ◆ Careful scoping of scans is necessary to avoid expensive and exhausting meetings (delayed transaction close, fees to advisors) ◆ Source code hygiene can help prevent issues RESULTS
  • 22. © 2019 Synopsys, Inc. 22 © 2019 Synopsys, Inc.22 Synopsys Confidential Information A DELAYED DEAL Diligence of a SaaS / on-prem software company Conducted one-time OSS audit Licensing issues identified ◆ The Target company had improperly modified and deployed an OSS component within their software package ◆ The improperly modified code had been included in legacy distributed versions of the product, limiting the company’s ability to upgrade customers to a more recent version SITUATION ◆ Completed Black Duck audit ◆ Legal advisors conducted research on the license’s copyright owner to evaluate potential outcomes ◆ Identified several “best” and “worst” case scenarios and evaluated actions required by Target prior to close ACTION Outcomes ◆ Target required to remediate issue and execute necessary deployments prior to close (delayed deal closing) ◆ Modified reps & warranties and advised on explanation for future buyers Lessons learned ◆ Lack of OSS insight can delay a transaction ◆ A distributed codebase can lead to ongoing licensing concerns RESULTS