After the Champagne: The 18-Month Integration Nobody Warns You About
The close simply marks the end of the beginning. The real integration—forging two digital ecosystems into one—will consume the next 18 months. It's not an IT project; it's a deep, structural business transformation, moving past the champagne into complex ERP work and application rationalization.
Series: The M&A Integration Playbook — Part 4 of 4
Over the past three weeks, I’ve walked you through the sign-to-close sprint, the dual-maintenance execution model, and the human side of M&A integration. If you’ve followed along, you have a solid playbook for surviving the first 30 days.
Now I need to be honest with you about what comes next: those first 30 days were the easy part.
The deal close is a milestone the entire company celebrates. The champagne comes out, the integration is declared “on track,” and leadership attention starts drifting to the next priority. But for the technology team, the close simply marks the end of the beginning. The real integration — the deep, structural work of forging two digital ecosystems into one — will consume the next 12 to 18 months.
The ERP Problem
The Enterprise Resource Planning system is the heart of a manufacturing company. It manages finance, supply chain, manufacturing processes, global trade. It touches every part of the business, every day.
Integrating two ERP systems is not an IT project. I need to say that clearly because the misconception causes real damage. It is a business transformation project that IT enables. The finance team, supply chain, manufacturing operations, and commercial functions all have to align on master data, processes, chart of accounts, and reporting structures before a single line of configuration is written.
In an industrial manufacturing environment, the ERP integration runway is typically 12-18 months. That’s not because the technology is slow — it’s because the business decisions that drive the configuration are complex, politically charged, and consequential. Which cost center structure wins? Whose chart of accounts do we adopt? How do we harmonize material master data across two companies that have been coding products differently for decades?
My team’s role in this marathon is clear: ensure the underlying platforms are secure, scalable, and resilient while the business makes these decisions. We don’t drive the ERP integration — we make sure the road is paved and the guardrails are up.
The Application Rationalization Grind
Beyond the ERP lies the sprawling landscape of non-ERP applications. In any acquisition of meaningful size, you’ll catalog hundreds of applications on both sides — specialized lab information management systems, custom logistics trackers, regional CRM instances, niche compliance tools, legacy reporting platforms.
For each one, the business has to answer a deceptively simple question: which one wins?
Do we absorb their application into ours? Do we absorb ours into theirs because it’s actually better? Do we co-exist for a defined period? Do we kill both and buy something new? This “application disposition” process is one of the most time-consuming and politically sensitive workstreams in any integration, because every application has an owner who believes their tool is essential and irreplaceable.
The technology leader’s job is to drive this rationalization with data, not politics. Build a clear scoring model: total cost of ownership, user count, technical debt, security posture, integration complexity, business criticality. Present the options. Let the business decide. Then execute the migration, consolidation, or decommissioning of the underlying infrastructure — servers, databases, services, licenses — methodically and without cutting corners.
This is unglamorous work. It will not make a headline. It will not get you invited to present at a conference. But it is the work that determines whether the acquisition delivers its promised value or slowly drowns in accumulated technical debt and redundant platforms.
The Security Posture Shift
There’s a security dimension to the 18-month horizon that’s easy to overlook in the Day 1 rush. During dual maintenance, you accepted a controlled level of risk: legacy endpoints you don’t fully manage, network segments with limited visibility, identity environments you don’t control.
The 18-month plan is your roadmap for systematically retiring that risk. Every legacy system decommissioned is an attack surface reduced. Every user migrated to your identity platform is a credential you can enforce MFA on. Every application consolidated is a patch management headache eliminated.
I track this as a “security debt retirement” metric — a running tally of inherited risk items from the acquisition, with clear owners and target remediation dates. It gives the board a simple story: “We inherited X risks at close. We’ve retired Y. Here’s the plan for the rest.” That kind of narrative builds confidence and justifies continued investment in the integration program when budget fatigue inevitably sets in around month 9.
The Trap: Declaring Victory Too Early
The single biggest risk in the 18-month horizon isn’t technical. It’s organizational attention.
Around month 6, the integration will start feeling “done” to everyone except the people doing the work. The acquired employees have settled in. The major fires are out. Leadership has moved on to the next strategic initiative — possibly another acquisition.
This is when integration programs die. Not with a dramatic failure, but with a slow resource drain. Key people get pulled to other projects. Budget gets “optimized.” The remaining migration workstreams — the hard, boring, essential ones — stall.
The antidote is governance. A standing integration steering committee that meets regularly, reviews progress against the original plan, and has the authority to protect resources. If you don’t build this governance muscle at the start, you won’t be able to summon it when you need it most.
What I’ve Learned
After leading technology integrations across multiple acquisitions, the lessons that stick aren’t technical. They’re structural:
The plan is a living document. The integration plan you build during sign-to-close will be wrong in important ways. That’s not failure — it’s reality. Build in the assumption registers and decision gates to adapt without panic.
Communication never stops. The cadence of updates to leadership, to acquired employees, and to your own team should actually increase after Day 30, not decrease. The middle of an integration is when people feel most forgotten.
Celebrate the boring wins. Decommissioned a legacy domain controller? That’s worth recognizing. Migrated the last batch of users off a legacy email platform? Send the note. These micro-celebrations sustain morale through a marathon that can feel thankless.
Document everything. Not for compliance — for the next one. If your organization is acquisition-driven, you will do this again. Build the playbook as you go, with honest retrospectives on what worked and what didn’t. Your future self will thank you.
The Full Playbook
Over the past four weeks, I’ve shared the core of how we approach M&A integration from the infrastructure, operations, and cybersecurity chair:
Week 1: The sign-to-close planning gap and discovery funnel
Week 2: The dual-maintenance execution model for Day 1
Week 3: The change management strategy that makes or breaks adoption
Week 4: The 18-month horizon of ERP integration, application rationalization, and security debt retirement
This series was drawn from live experience — not theory, not a consultant framework, not a conference talk. It’s what the work actually looks like when you’re responsible for merging two global organizations.
I’ve packaged the operational tools behind this series into a Day 1 Readiness Scorecard and a Sign-to-Close Planning Checklist — the same frameworks my team uses for every acquisition. Paid subscribers get access to both, along with the full-length deep dive that ties this series together. If you’ve found value in these four pieces, consider subscribing — or if you’d rather just have a conversation about your specific integration, connect with me on LinkedIn. Either way, I’d like to help.
This concludes the M&A Integration Playbook series. Next week, The Strategy Brief returns to its regular format with a new topic. If there’s a subject you’d like me to tackle — AI governance, security awareness, CISO career strategy, or anything at the intersection of cybersecurity and business leadership — send me an email. I build the editorial calendar around what you’re dealing with.
Follow The Strategy Brief at strategix.blog for weekly sharp takes on cybersecurity leadership, AI governance, and the business of running IT at scale.