Skip to main content

M&A Insights

Pre-IPO Cybersecurity: What Investment Bankers Miss

Simone Nogara

Simone Nogara

November 2025 · 7 min read

The IPO preparation process is exhaustively managed across financial, legal, and commercial dimensions. Yet cybersecurity assessment remains conspicuously absent from the standard playbook — an omission that exposes issuers, underwriters, and public market investors to material undisclosed risk.

This gap reflects a structural misalignment: investment banks organise IPO execution around financial, legal, and commercial workstreams. Cybersecurity, when considered, is treated as a subset of IT operations rather than the standalone risk category that regulators and institutional investors increasingly recognise it to be. Several high-profile IPOs have been complicated by cybersecurity disclosures that emerged during or after the offering, resulting in pricing adjustments, delayed timelines, and investor litigation.

The Structural Blind Spot

Cybersecurity does not fit neatly into traditional IPO workstreams. It is not purely financial (though it has material financial implications), not exclusively legal (though it creates significant exposure), and not simply operational (though it affects continuity). This cross-cutting nature means cybersecurity falls between established responsibilities, with each workstream assuming another will address it.

The result: most companies approaching IPO have never undergone comprehensive independent cybersecurity assessment. Their security posture reflects whatever investment management chose during the private phase — calibrated to perceived threats and existing investor preferences rather than the disclosure and governance standards expected of a public company.

SEC Cybersecurity Disclosure Requirements

The SEC's cybersecurity disclosure rules[1] (July 2023) require registrants to disclose material incidents on Form 8-K within four business days, plus annual disclosure on Form 10-K of risk management processes, governance structures, and board oversight. The S-1 filing must describe cybersecurity risk management, strategy, and governance in sufficient detail for investor assessment, plus any material incidents during the reporting period.

The challenge: many governance structures required for these disclosures do not exist in the private company context. A company with no dedicated CISO, no formal risk assessment methodology, and no board-level reporting framework cannot credibly populate these sections without first establishing the underlying programmes — requiring time, expertise, and investment planned well ahead of the IPO timeline.

EU Prospectus Regulation and NIS2 Implications

The EU Prospectus Regulation[2] requires disclosure of all material risk factors. Generic cyber risk language that merely acknowledges threats without describing specific exposure and mitigation is increasingly challenged by national competent authorities during prospectus review.

NIS2[3] implementation across EU member states adds a further dimension. Companies in scope face mandatory obligations with significant non-compliance penalties. An issuer within NIS2 scope but not compliant faces contingent regulatory liability requiring prospectus disclosure. The personal liability provisions for management bodies create governance risk directly affecting directors and officers. For financial services companies, DORA[4] imposes additional ICT risk management requirements covering third-party oversight, resilience testing, and incident reporting.

Investor Scrutiny During the Roadshow

Institutional investors now routinely include cybersecurity questions in IPO due diligence. During roadshows, management teams face specific questions: incident history, CISO reporting line, security spend proportion, independent assessment results, cyber insurance coverage, and supply chain risk management.

Companies that cannot provide confident answers face two risks: failure to achieve necessary institutional participation, and potential liability if a subsequent incident reveals pre-IPO representations as misleading.

Common Findings That Delay IPOs

Undisclosed Security Incidents

The discovery of incidents not previously disclosed to the board or advisory team is the most disruptive finding. These may have been handled by IT without escalation or categorised as operational issues. Regardless, they require immediate legal assessment of disclosure obligations and regulatory exposure.

Inadequate Access Controls

Shared administrative accounts, absent multi-factor authentication, and lack of privileged access management create both immediate security risk and governance deficiencies. Remediation typically requires three to six months and must be substantially complete before filings can credibly describe the access control framework.

Third-Party Risk Concentration

Heavy reliance on a small number of critical third-party providers creates concentration risk that must be disclosed and ideally mitigated before offering. This requires vendor cooperation and cannot be compressed into weeks.

Remediation Timelines

Establishing governance structures, technical controls, and risk management processes for public company cybersecurity disclosure takes twelve to eighteen months. Cybersecurity maturity requires implementation and operational validation of controls, monitoring capabilities, and board reporting frameworks tested through at least one reporting cycle.

Companies that begin assessment eighteen months before their target IPO date can typically address gaps within the preparation timeline. Those discovering material deficiencies in final stages face a choice: delay the offering, or proceed with enhanced risk disclosure that adversely affects pricing. The optimal approach integrates cybersecurity readiness from inception — engaging specialist advisory alongside legal counsel and auditors.

The Role of Cyber Insurance

Cyber insurance serves both as risk transfer and as a signal of maturity to investors — obtaining coverage means passing the insurer's underwriting assessment. However, reliance on insurance as a substitute for investment is a strategy sophisticated investors will discount. Coverage limits are modest relative to potential costs, and exclusions (war, infrastructure failure, unencrypted data) significantly reduce effective coverage.

Insurers are increasing underwriting requirements, and companies with material deficiencies struggle to obtain coverage at reasonable premiums. For a pre-IPO company, the inability to obtain cyber insurance at market rates is itself a signal that should be evaluated and disclosed.

Recommendations for Investment Banks and Issuers

Investment banks should integrate cybersecurity assessment as a standard IPO preparation workstream. This does not require internal cybersecurity expertise; it requires recognising cyber as a material risk category and engaging specialist advisors, as with legal and accounting specialists.

For issuers: cybersecurity readiness is now a prerequisite for a successful public offering. The regulatory environment demands specific disclosure. Investors demand evidence of mature governance. The threat landscape demands genuine capability. None of this can be achieved in the final weeks before filing. Begin early, invest appropriately, and treat cybersecurity readiness with the same seriousness as financial audit readiness.

References

  1. SEC Final Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure (July 2023). SEC.gov
  2. Regulation (EU) 2017/1129 (EU Prospectus Regulation). EUR-Lex
  3. Directive (EU) 2022/2555 (NIS2 Directive). EUR-Lex
  4. Regulation (EU) 2022/2554 (DORA). EUR-Lex

Ready for institutional-gradecybersecurity?

Confidential assessments for qualified Private Equity and Family Office entities requiring sovereign defense infrastructure.