• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Crucial Point LLC

Accelerating Technology

  • About Crucial Point
    • About Bob Gourley
    • Announcements
    • Corporate Events
    • Press
    • CTOvision
      • Go Pro!
  • Contact Us
  • Services
    • Technology Due Diligence
    • CTO Advisory Services
    • Compliance and Cybersecurity
    • CTO-as-a-Service
    • CISO-as-a-Service
    • Corporate Events
  • Crucial Point Clients
  • Cybersecurity Best Practices
    • Cybersecurity Best Practices
    • Cybersecurity At Home
    • Health Insurance Portability and Accountability Act (HIPAA) Security Rule Compliance
    • The FFIEC Cybersecurity Assessment Tool Can Be Used To Raise Your Security Posture
    • Companies Who Interact With European Citizens Must Check Architecture For Compliance With New Data Rules

Technology Due Diligence

Home » Crucial Point Services » CTO Advisory Services » Technology Due Diligence

Crucial Point (now part of OODA LLC) has extensive experience in technology due diligence for Transactional Support/M&A and related activities, including support to Venture Capital and Private Equity firms and for businesses seeking to acquire other businesses. Our focus is on helping business decision-makers understand what is unique, especially in the technologies of the company under evaluation and the value customers see in those technologies.

In Technology Due Diligence, There Is No Substitute For Experience

Assessing the value of a technology, especially the value to potential enterprise customers, requires an understanding of the entire stack of technology, from storage to servers to operating systems to middleware to communications to applications. Crucial Point brings technologists to bear with deep experience in the full spectrum of enterprise IT and years of experience in performing technical due diligence (TDD) studies.

We have captured lessons from our experience in technology due diligence in a short presentation on the OODA YouTube Channel this link and embedded below:

These lessons are provided in a way that should be of use to organizations on both the buy-side and sell-side of potential transactions, and concludes with actionable recommendations including expectations you should have when selecting a due diligence partner.

Our hope in producing this short overview of lessons learned from technology due diligence is that you will keep OODA in mind for your future needs. In tech due diligence, experience matters, and we have that.

Among the risks we evaluate are:

  • Risks that technology is not enterprise-ready
  • Risks that the technology is not competitive or does not differentiate enough
  • Risks that the technology will not scale, or is not supported well enough
  • Risks that the technology is not secure enough

Our team also brings an unparalleled background in understanding the mission needs of both business and government customers. Engagement teams are led by Crucial Point founder and CTO Bob Gourley and include hand-selected technology experts with deep domain experience relevant to the task at hand.

Questions/comments/suggestions?   Please contact us for more information.

Additional Due Diligence Information:

  • Crucial Point Due Diligence Services: A summary of our offerings
  • Our Technology Due Diligence Process: Our core processes
  • Due Diligence in Cybersecurity: Experience Matters
  • Due Diligence in Defense, Intelligence and National Security: A specialty
  • IT Due Diligence: Analyze target company IT infrastructures, processes and people
  • CTO Consultants for Technology Due Diligence: A key focus area for Crucial Point
  • How to Find and Select a Due Diligence Firm: Tips from the Crucial Point team

OODA LLC: Put our team of experts on your side

May 5, 2019May 5, 2019
OODA LLC: Put our team of experts on your side

Crucial Point is now part of OODA LLC. OODA helps our clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and adaptive strategies for the future.  We are a global strategic advisory firm with deep DNA in global security, technology, and intelligence issues. OODA offerings include: Security Services including CISO-as-a-Service We live in…

Announcements, Best Practices, CTO as a Service, Technology Due Diligence

Announcing OODA LLC: Helping clients identify, manage, and respond to global risks and uncertainties

January 8, 2019February 10, 2019
Announcing OODA LLC: Helping clients identify, manage, and respond to global risks and uncertainties

We have some exciting news to announce. We are now part of OODA LLC. If you have a background in cybersecurity or the military or are a student of decision theory you can probably tell our company name is meant to honor one of the greatest warrior thinkers of the modern age, Air Force Colonel John Boyd. Boyd was an…

Announcements, Best Practices, Board, Cryptocurrency, CTO as a Service, Government Markets, Press, Technology Due Diligence, Technology Research

Updated Cybersecurity Best Practices

October 21, 2018October 21, 2018
Updated Cybersecurity Best Practices

We capture lessons we learn in helping clients continually improve their cybersecurity posture. We also track adversary behaviors on a daily basis at ThreatBrief.com and capture lessons learned and shared from across the community. We maintain a succinct list of these best practices for your reference. Find them at The Crucial Point Guide to Cybersecurity Best Practices. Reducing digital risk…

Announcements, Best Practices, CTO as a Service

Leveraging The FFIEC Cybersecurity Assessment Tool (CAT) To Improve Corporate Culture and Raise Security Posture

March 3, 2018July 21, 2019
Leveraging The FFIEC Cybersecurity Assessment Tool (CAT) To Improve Corporate Culture and Raise Security Posture

You know compliance does not equal security. We wonder if the folks who write all these compliance rules believe that, but we know you know it. Still, if you do it right, you can use compliance reviews and evaluations to help you reduce risk. The art form is to find balance. You have to make sure you comply but do…

Announcements, CTO as a Service, Cybersecurity

Complying With The GDPR: Easier with a CTO on your side

March 3, 2018March 16, 2018
Complying With The GDPR: Easier with a CTO on your side

If you interact with companies in Europe or hold data on any EU citizen you must comply with the European Union’s (EU) General Data Protection Regulation (GDPR). It much easier to do that with an experienced CTO on your side. For a good update on the GDPR see: EUGDPR.org The GDPR is the most important change in data privacy regulation…

Announcements, Best Practices, CTO as a Service

Technology Due Diligence for Mergers and Acquisitions Now Requires Cybersecurity Assessment

February 26, 2018March 16, 2018
Technology Due Diligence for Mergers and Acquisitions Now Requires Cybersecurity Assessment

Historically due diligence assessments before Mergers & Acquisition (M&A) transactions have focused on traditional risk areas that could pose a significant financial risk, like issues of tax, employment, compliance with regulatory environments, intellectual property protection, and of course contracts. Now that technology is a part of every firm’s business model things have changed. Cybersecurity has become part of every M&A…

Announcements, Best Practices, CTO as a Service, Cybersecurity, Technology Due Diligence

The Cost Of Cyber Crime Is Growing: Apply economical mitigation strategies to protect your business

February 22, 2018March 16, 2018
The Cost Of Cyber Crime Is Growing: Apply economical mitigation strategies to protect your business

In cybersecurity it is hard for stakeholders to get a picture of the full impact of cybercrime. Two reports this week are the latest to take a crack at it. One of the reports is from McAfee in collaboration with the Center for Strategic and International Studies (CSIS). It shows that cybercrime currently costs the global economy a startling $600 billion annually,…

Announcements, Best Practices, CTO as a Service, Cybersecurity

Guest Post At WhiteHawk: The Most Important Factor in Addressing your Organization’s Cyber Risk

February 22, 2018March 16, 2018
Guest Post At WhiteHawk: The Most Important Factor in Addressing your Organization’s Cyber Risk

Crucial Point founder and CTO Bob Gourley published a guest editorial at WhiteHawk.com on the topic of organizational cyber risk mitigation. This post, based on years of operational experience, begins: Over the last two decades I have participated in cyber risk assessments across many economic sectors, including in government, the military, healthcare, pharmaceuticals, aviation, defense, manufacturing, and finance. I’ve had…

Best Practices, CTO as a Service, Cybersecurity, Press, Technology Due Diligence

The Cyber Threat: Best selling cyber intelligence book updated for 2018

February 18, 2018March 16, 2018
The Cyber Threat: Best selling cyber intelligence book updated for 2018

The Cyber Threat, the bestselling book from pioneer of cyber threat intelligence Bob Gourley, has now been updated for 2018. The book provides up to date insights into the threat actors in cyberspace including their history and current tactics. The book is full of information of use to executives in multiple sectors of the economy. Bob Gourley was the first…

Announcements, Best Practices, CTO as a Service, Cybersecurity

Crucial Point LLC Founder and CTO Bob Gourley Named To List Of Top Data Miners

February 14, 2018June 21, 2019
Crucial Point LLC Founder and CTO Bob Gourley Named To List Of Top Data Miners

Crucial Point founder and CTO Bob Gourley has been named one of the top data miners by Import.io, the platform for web data extraction and use. From the report: In the blossoming world of big data, the data miner is king. Although your own business may already see the value in data, it’s more difficult to understand how to data mine for…

Announcements, CTO as a Service, Press, Technology Due Diligence, Technology Research

CTOvision One Of The Best IT Blogs 2018: Must-Read Resources for CIOs, IT & Security Pros

January 13, 2018March 1, 2018
CTOvision One Of The Best IT Blogs 2018: Must-Read Resources for CIOs, IT & Security Pros

CTOvision, the blog focused on enterprise technologists, has been named as one of the best IT blogs for 2018 by VertitechIT. Information Technology. Sometimes we get so focused on the bits and bytes side of the equation we forget about the information part. When it comes right down to it, IT is all about using technology to inform, to communicate,…

CTO as a Service, Press, Technology Research

Trump signs bill to modernize government IT and cybersecurity

December 13, 2017March 1, 2018
Trump signs bill to modernize government IT and cybersecurity

On Tuesday, US president Donald Trump signed the 2018 National Defense Authorization Act (NDAA) into law, which contains a provision that could force the federal government to upgrade its out-of-date IT systems. The Modernizing Government Technology (MGT) Act was enacted as part of the NDAA, but it is facing some roadblocks from Congress. The MGT Act creates a $500 million fund over…

CTO as a Service, Government Markets, Press

Featured in TheCipherBrief: Companies Need to ‘Think Twice’ Before Retaliating Against Hackers

October 22, 2017March 1, 2018
Featured in TheCipherBrief: Companies Need to ‘Think Twice’ Before Retaliating Against Hackers

Bob Gourley is a member of TheCipherBrief.com’s cyber advisory board. The following provides his context on key cybersecurity policy issues of interest to the technology and business community. From: Companies Need to ‘Think Twice’ Before Retaliating Against Hackers The Cipher Brief: When organizations are targeted with cyber attacks, are they able to respond by hacking back – to either retrieve their…

CTO as a Service, Cybersecurity, Press

The Automotive Cyber Security Summit: October 25-27 Fremont California

October 14, 2017March 3, 2018
The Automotive Cyber Security Summit: October 25-27 Fremont California

The Automotive Cyber Security Summit is for practitioners in the automobile industry who are working to predict and mitigate both current and future risks due to technology. The event brings together experts from across the auto industry, including manufactures, designers and providers of on-demand services and autonomous vehicles.   For more see: Automotive Cybersecurity Summit

CTO as a Service, Events, Technology Research

The Government Won’t Protect Your Internet Privacy, So Here Is How To Do It Yourself

March 30, 2017March 1, 2018
The Government Won’t Protect Your Internet Privacy, So Here Is How To Do It Yourself

“Stealing personal information is much easier if all that data is aggregated,” says Bob Gourley, co-founder of Cognitio Corp, a firm that does security consulting, and former Chief Technology Officer of the Defense Intelligence Agency.
Using advanced tracking tools, artificial intelligence, and botnets, a malicious actor could “learn if an individual is going to be out of town at a certain time,” explains Gourley. Similarly, access to personal-finance and medical information could help would-be criminals commit fraud later on.

CTO as a Service, Cybersecurity, Press

Bob Gourley on cutting edge tools debuting at RSA

March 17, 2017March 3, 2018
Bob Gourley on cutting edge tools debuting at RSA

RSA is always a great place to learn the latest technology, tools and procedures for enterprise grade cyber defense.

CTO as a Service, Cybersecurity, Events, Press

CTOvision named to FedTech’s list of 50 Must-Read Federal IT Blogs

December 20, 2016March 4, 2018
CTOvision named to FedTech’s list of 50 Must-Read Federal IT Blogs

We were honored again to have our CTOvision blog named to FedTech’s list of 50 must-read federal IT Blogs. From FedTech’s intro to the list: It was a whirlwind year in the world of federal IT, with the White House, Office of Management and Budget, and many agencies focused on cybersecurity, IT modernization, data center closures and optimization, and cloud adoption. Sometimes,…

Announcements, CTO as a Service, Press, Technology Due Diligence

How the cyber SWAT team tackles the biggest crises (Bob Gourley Comments)

December 12, 2016March 1, 2018
How the cyber SWAT team tackles the biggest crises (Bob Gourley Comments)

The elite group that works with FBI investigators and DHS is tasked with stopping the threat; Catherine Herridge has the story for ‘Special Report’. Context from Bob Gourley. For more see: FoxNews  

CTO as a Service, Press

What you can do to mitigate the threat of DDoS attacks

December 2, 2016March 16, 2018
What you can do to mitigate the threat of DDoS attacks

The recent DDoS attacks on corporate networks have impacted businesses, their clients and individuals. In this special edition of QSights, cyber risk-reduction experts, Cognitio, provide steps organizations can take to help prevent an attack, to ensure their internal network cannot be used as a platform to attack others and to determine if the right plans are in place to mitigate…

Best Practices, CTO as a Service, Press

Despite privacy concerns, Microsoft calls Windows 10 ‘the most secure version of Windows’

November 14, 2016March 1, 2018
Despite privacy concerns, Microsoft calls Windows 10 ‘the most secure version of Windows’

“Over the last two years we have seen ransomware evolve to the point where it can come in from multiple paths, spread throughout an enterprise and backup holdings while remaining covert to standard detection, and then lock down files all at once causing an enterprise-wide crisis,” Gourley said. “What was once seen as a joke is now one of the…

CTO as a Service, Press

Primary Sidebar

Our Latest

OODA LLC: Put our team of experts on your side

Crucial Point is now part of OODA LLC. OODA helps our clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and … [Read More...] about OODA LLC: Put our team of experts on your side