Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/23/2019
06:20 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Moody's Outlook Downgrade of Equifax: A Wake-up Call to Boards

The move provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

Wall Street has been abuzz this week over drastic measures by credit ratings agency Moody's to downgrade its rating outlook of Equifax, with expensive data breach fallout named as a major factor for the poor marks. While the action was not unexpected, the landmark nature of the outlook should provide some needed emphasis to both boards of directors and CISOs of the modern business imperative for cyber resilience, security and risk experts say.

"Today's news puts a punctuation mark on the business reality of cybersecurity risks," says Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, who believes this is going to push more boards to take in increasingly active role in understanding and managing cybersecurity risks. "They definitely need to do more than ask the CISO some high-level questions. Equifax is in the hot seat now, but most of the Fortune 500 CEOs and CISOs would do no better in the same situation."

CNBC broke the news last night of the note from Moody's changing its rating outlook that cited the $690 million in breach expenses — including costs for settling mounting class action lawsuits — and increased need for infrastructure investments to be made by the company through 2020 to address systemic cybersecurity weaknesses found in post-breach scrutiny.

Joe Mielenhausen, a Moody's spokesperson, told CNBC that "this is the first time the fallout from a breach has moved the needle enough to contribute to the change" in ratings outlook.

Equifax's record-breaking data breach, first disclosed in September 2017, was eventually found to have exposed the information of 147.9 million people. Technically the exposure was triggered through the exploitation of an unpatched Apache Struts vulnerability, but security industry experts and government officials say that more serious organizational problems and lack of executive oversight were the true culprit of what Congress called an "entirely preventable" breach. 

The fallout from the breach included the ouster of Equifax's CISO and eventually its CEO, and the company is still feeling the effects of class action suits from consumers and shareholder derivative lawsuits

"This is Moody's delivering on their intent last November to take cyber risk into account when grading companies," says Steve Durbin, managing director of the Information Security Forum. "This will certainly send a clear message to boards in a language that they understand that cyber risk is integral to business risk and that the implications of a breach or loss of data can have very real impact." 

Durbin says he's been advocating for some time to both the insurance industry and credit rating agencies to take cyber risk into account as they set policy pricing and assess company value. He believes this action by Moody's will set the tone for assessment of business health in the future.

"Moving forward, this should become the norm since cyber risk is so integral to business risk that an assessment of business health without taking cyber risk and a company’s resilience into account will become meaningless," he says.

Indeed, CNBC reported that Moody's hinted as such in its Equifax note, stating that it will increasingly scrutinize cybersecurity "for all data oriented companies" in the future.

Security insiders say that this Moody's action should not only be a wake-up call to CEOs and boards, but it's also a crucial inflection point for CISOs.

According to Laurence Pitt, security strategy director at Juniper Networks, it's another "chance in conversation" for security leaders — one that they shouldn't blow by lacking the right data or insights about organization-wide cyberrisk. 

"This incident changes how business will look at cybersecurity, so cybersecurity needs to change how it talks to business," he says.

Related Content: 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
5/28/2019 | 8:45:14 AM
One Lone Individual
How many place this into context of CEO testimony before Congress (slightly serious indeed) where he claimed it was ALL the fault of just one (1) security enginer, read that IT drone unit, who failed to perform a patch on a system.  WOW, THAT EASY?   Showed immense deaf and blind attitude by management and board and so this article SHOULD be read inlight of that horrendous judgment.  Oh, why is all the flak flying here?  Just one guy?  Hey, the CEO said so - it must be true, right?  
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12865
PUBLISHED: 2019-06-17
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
CVE-2017-10720
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi name. This application is installed o...
CVE-2017-10721
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has Telnet functionality enabled by default. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car ga...
CVE-2017-10722
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi password. This application is install...
CVE-2017-10723
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows it...