Independent IT Advisory

We assess the IT risk
your deal team
cannot see.

nullsys provides independent technical due diligence for M&A transactions and standalone IT revision for compliance purposes. No vendor relationships. No implementation work. Objective by design.

Schedule a conversation 30 minutes. No obligation.

Two services.
One focus.

We do not consult on IT strategy, manage implementations, or sell software. We assess and report - independently, on a fixed timeline, with findings that hold up under scrutiny.

M&A

Technical Due Diligence

An independent assessment of the target company's IT infrastructure, security posture, licence compliance, and regulatory exposure - delivered within the transaction timeline.

  • Infrastructure and architecture review
  • Security vulnerability assessment
  • Software licence compliance audit
  • NIS2, GDPR, and DORA gap analysis
  • Integration cost baseline
  • Rep and warranty input for the SPA
Compliance

IT Revision and Compliance Audit

A structured, independent review of IT controls, security, and regulatory compliance delivered as a formal report to board level - credible to investors and regulators in a way internal assessments cannot be.

  • Infrastructure health assessment
  • Access control and identity review
  • NIS2 and GDPR readiness report
  • Board-level executive summary
  • Remediation priority ranking
  • Annual revision programme option

What IT due diligence
consistently misses.

In Croatian and SEE M&A transactions, IT infrastructure review is the last workstream - if it happens at all. These are the liabilities that surface after close.

01

Shadow IT

Critical processes running on unmanaged infrastructure, invisible until operational disruption occurs post-close.

02

Unlicensed software

Microsoft, Oracle, and Adobe liabilities that transfer with the transaction as six-figure compliance obligations.

03

Breach history

Unpatched systems and prior incidents that were never disclosed. These become the acquirer's liability on day one.

04

Regulatory exposure

Inherited NIS2 and GDPR non-compliance that transfers with the acquisition and immediately becomes the acquirer's gap.

05

Integration cost

Without an independent baseline, post-acquisition IT costs are systematically underestimated in the deal model.

06

Key person risk

Systems maintained by one or two individuals. When they leave, institutional knowledge leaves with them.

How an engagement
works.

Six phases from initial contact to delivery. Proactive communication throughout - no corrections or surprises at the end. We align to your transaction deadline, not the other way around.

00

Scoping and qualification

Understanding the transaction context, target size, time window, and access level. NDA signed before any information about the target is shared.

1 to 3 days
01

Environment mapping

Preparation of a Risk and Controls Matrix and initial document request list for the target. Interview schedule defined with key contacts.

4 to 7 days
02

Interviews and walkthroughs

On-site or remote interviews with CIO and IT leads. Direct observation of controls in operation - not just documentation review.

5 to 10 days
03

Control testing and gap analysis

Testing whether controls function in practice. Vulnerability assessment, licence audit, NIS2 and GDPR gap analysis.

5 to 7 days
04

Draft report and review

Risk classification, cost quantification, draft shared with the client before finalisation. No surprises at the end.

4 to 7 days
05

Delivery and SPA input

Findings presented to the acquirer and legal team. Rep and warranty input sheet delivered in a format the legal team can use directly.

1 to 2 days
The independence principle

We do not implement
what we audit.

nullsys has no commercial relationship with technology vendors, system integrators, or cloud providers. Our findings are objective by design - we have no incentive other than accuracy.

This is what makes our assessments credible to investors, acquirers, boards, and regulators in a way that internal IT team reports or vendor-affiliated consultants cannot be.

We put this in writing in every engagement agreement.

01

Expert referral for law firms

Law firms introduce nullsys when IT risk is material. We engage directly with the acquirer or target under a separate NDA. Project-based, no retainer required.

02

Parallel workstream

We run alongside legal and financial diligence simultaneously. We align our timeline to the transaction deadline.

03

Rep and warranty input

Findings delivered in a format the legal team uses directly to draft IT-related representations and warranties in the SPA. No translation required.

Get in touch

Start with a
30-minute conversation.

The initial call is to understand your situation and establish whether nullsys is the right fit. No obligation, no pitch deck.

We work with law firms managing M&A transactions, acquirers preparing for close, and boards requiring independent IT revision.

Coverage
Croatia and SEE region
Engagement model
Project-based, fixed fee

We respond within one business day. Submissions are treated as confidential.