With each acquisition, we gain new insights that help us refine our approach. We recognize that every business has its own expertise and ways of operating, so we approach each acquisition with fresh eyes and a willingness to learn. By working closely together, we ensure a smooth onboarding process that supports the business’s long-term success within Lumine.
In Conversation With: Joe Kelly, VP, Head of IT & Data Security
At Lumine, IT and Data Security (ITDS) play a crucial role in ensuring a smooth transition for businesses joining our portfolio.
From the due diligence phase through post-acquisition support, our team works closely with each business to assess its existing IT landscape, strengthen cybersecurity, and provide guidance on essential standards for operating as part of a public company.
In our latest installment of the In Conversation With series, we sit down with Joe Kelly, Vice President and Head of IT and Data Security. Joe sheds more light on this process, discussing how the team approaches M&A, drives collaboration across the portfolio, and maintains a balance between decentralization and shared best practices.
Watch the video below and read more to dive deeper into Joe’s perspective.
“When we welcome a new business, our decentralized IT and Data Security approach allows them to continue operating as they always have—maintaining their infrastructure, team, and culture.”
Q: Can you share an overview of the IT and Data Security function involvement in the M&A process?
At Lumine, IT and Data Security are deeply embedded in the M&A process, starting from the due diligence phase. Our role is to assess the company’s IT assets, infrastructure, applications, and cybersecurity posture to identify potential risks, integration challenges, and opportunities for improvement.
Beyond technical due diligence, we take a proactive approach to post-acquisition enablement. By evaluating the target’s IT and Data Security capabilities early on, we gain a clear understanding of their strengths and areas requiring reinforcement. This ensures a smooth transition once they officially join Lumine, while maintaining operational resilience and compliance.
To uphold security and operational excellence across all businesses, we have a set of priority controls that each company reviews and implements. These controls are designed to enhance cybersecurity, optimize IT efficiency, and align with the requirements of a public company, all while preserving the autonomy of each business.
Q: How does the IT team work with businesses post-acquisition?
As mentioned, we know every business is different. Post-acquisition, our IT and Data Security teams engage with each business based on its unique size, structure, and operational maturity. Some businesses are lean startups, others are carve-outs, and some are more mature organizations with established processes. Our approach is tailored to fit their needs, ensuring they receive the right level of support without unnecessary disruption.
What sets Lumine apart is our leadership depth and the wealth of expertise across our portfolio. Our ITDS leaders act as both advisors and collaborators, sharing best practices, lessons learned, and proven strategies to strengthen cybersecurity and IT governance. This knowledge-sharing culture drives innovation and resilience across the portfolio, ensuring that businesses continue to evolve while benefiting from Lumine’s collective experience.
Q: Can you tell us more about what the decentralization approach to acquisition means in ITDS?
Lumine’s decentralized model allows acquired businesses to retain their existing IT infrastructure, personnel, and culture, ensuring they continue to operate as they always have. Decentralization doesn’t mean isolation—it means flexibility with a foundation of shared security standards.
We provide a structured yet adaptable playbook that outlines essential IT and Data Security standards required for operating as part of a public company. Businesses have the autonomy to implement these standards in a way that aligns with their existing operations, ensuring compliance without forcing a rigid, one-size-fits-all approach.
Our philosophy is to empower businesses with the tools, guidance, and expertise they need while respecting their operational independence. This balance of autonomy and alignment is a key differentiator in how Lumine scales its portfolio.
Q: From an ITDS perspective, complete this sentence. At Lumine we…
At Lumine, we embrace a culture of continuous learning. Some days, we lead and share our expertise; other days, we listen and learn from the insights of our peers. Cybersecurity is an ever-evolving landscape, and it is important that we approach it with humility, curiosity, and a commitment to staying ahead of emerging threats.