Public Company M&A Environment: Are You Prepared for Potential Hostility? How Do You Respond?
22 March 2007
Foley Partners Patrick Quick and John Wilson, both members of the Transactional & Securities Practice, and Matt Parr, Managing Director of Mergers & Acquisitions for UBS, presented on the M&A environment for public companies on March 22, 2007. This presentation is a part of Fusion, the quarterly Web seminars focused on providing clear-cut answers to the most challenging M&A questions.
Topics included:
- What companies need to know about current trends: increased hostile M&A activity, reduced takeover defenses and increased shareholder activism
- How companies can prepare for and respond to unsolicited offers, hedge fund attacks and proxy contests
- How to advise the Board of Directors with respect to defensive measures, responses to offers and threats, and a potential sale of the company
Learn more about other events planned in this series by going to Foley.com/Fusion.
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.