<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2611183.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>The Rook</title>

  <lastBuildDate>Sun, 17 May 2026 19:41:05 -0400</lastBuildDate>
  <link>https://therook.buzzsprout.com</link>
  <language>en-us</language>
  <copyright>© 2026 Corvus Cybersecurity - The Rook</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>01920812-ff20-5ded-addc-1a215ee5127f</podcast:guid>
  <itunes:author>David Shaw</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Most security podcasts are built for practitioners. The Rook is built for the people who have to make decisions about security without being security experts.</p><p>Hosted by David Shaw — CISSP, fractional vCISO, and GRC consultant with 20 years in the seat — The Rook delivers board-ready intelligence for founders, PE operating partners, M&amp;A attorneys, and executives who own security risk when security isn’t their day job.</p><p>Every episode covers one topic in depth with examples from a real incident, a regulatory development, a threat pattern, or a market shift. No vendor hype. No practitioner jargon. Just what it means for the business you're running or the deal you're working on — and what to do about it.</p><p>New episodes every other Tuesday.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>David Shaw</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/wgbzdiil2yoftlleg1c6flrax7wk?.jpg</url>
     <title>The Rook</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/wgbzdiil2yoftlleg1c6flrax7wk?.jpg" />
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <item>
    <itunes:title>The Deal You Didn’t Know You Made: Cyber Risk in M&amp;A</itunes:title>
    <title>The Deal You Didn’t Know You Made: Cyber Risk in M&amp;A</title>
    <itunes:summary><![CDATA[Send us Fan Mail In this episode of The Rook, David Shaw, founder of Corvus Cybersecurity and principal vCISO, examines the most consistently overlooked risk in M&amp;A transactions: inherited cyber exposure. From Yahoo's misrepresentation of its breach history during the Verizon acquisition to the Marriott-Starwood breach that went undetected for four years, the pattern is the same. Cybersecurity due diligence gets a questionnaire, while financial and legal diligence get exhaustive scrutiny....]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2611183/fan_mail/new">Send us Fan Mail</a></p><p>In this episode of The Rook, David Shaw, founder of Corvus Cybersecurity and principal vCISO, examines the most consistently overlooked risk in M&amp;A transactions: inherited cyber exposure. From Yahoo&apos;s misrepresentation of its breach history during the Verizon acquisition to the Marriott-Starwood breach that went undetected for four years, the pattern is the same. Cybersecurity due diligence gets a questionnaire, while financial and legal diligence get exhaustive scrutiny. The result is that acquirers close deals and inherit compromised environments, undisclosed incidents, and compliance gaps that carry real remediation costs.</p><p><b>In this episode:</b></p><ul><li>How Yahoo&apos;s misrepresentations to Verizon held through signing, and what saved Verizon wasn&apos;t diligence</li><li>How Marriott bought a four-year-old, undetected breach when it acquired Starwood</li><li>Why the standard M&amp;A cybersecurity questionnaire fails to catch material risk</li><li>How R&amp;W insurance carve-outs and cyber insurance pre-existing condition exclusions are changing the stakes for deal teams</li><li>The four-stage cyber due diligence process used on the buy side, and the three-bucket model for translating findings into deal team decisions</li><li>What sellers should be doing now to protect deal value</li><li>Three artifacts every buyer should require, not just three questions to ask</li></ul><p><br/></p><p><br/></p><p><em>The Rook · Corvus Cybersecurity · corvus-cyber.com · David Shaw, CISSP, GLEG</em></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2611183/fan_mail/new">Send us Fan Mail</a></p><p>In this episode of The Rook, David Shaw, founder of Corvus Cybersecurity and principal vCISO, examines the most consistently overlooked risk in M&amp;A transactions: inherited cyber exposure. From Yahoo&apos;s misrepresentation of its breach history during the Verizon acquisition to the Marriott-Starwood breach that went undetected for four years, the pattern is the same. Cybersecurity due diligence gets a questionnaire, while financial and legal diligence get exhaustive scrutiny. The result is that acquirers close deals and inherit compromised environments, undisclosed incidents, and compliance gaps that carry real remediation costs.</p><p><b>In this episode:</b></p><ul><li>How Yahoo&apos;s misrepresentations to Verizon held through signing, and what saved Verizon wasn&apos;t diligence</li><li>How Marriott bought a four-year-old, undetected breach when it acquired Starwood</li><li>Why the standard M&amp;A cybersecurity questionnaire fails to catch material risk</li><li>How R&amp;W insurance carve-outs and cyber insurance pre-existing condition exclusions are changing the stakes for deal teams</li><li>The four-stage cyber due diligence process used on the buy side, and the three-bucket model for translating findings into deal team decisions</li><li>What sellers should be doing now to protect deal value</li><li>Three artifacts every buyer should require, not just three questions to ask</li></ul><p><br/></p><p><br/></p><p><em>The Rook · Corvus Cybersecurity · corvus-cyber.com · David Shaw, CISSP, GLEG</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2611183/episodes/19078341-the-deal-you-didn-t-know-you-made-cyber-risk-in-m-a.mp3" length="14687932" type="audio/mpeg" />
    <itunes:author>David</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19078341</guid>
    <pubDate>Mon, 27 Apr 2026 03:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2611183/19078341/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2611183/19078341/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2611183/19078341/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2611183/19078341/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="110.102" duration="32.5" />
    <itunes:duration>1219</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
