Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/23/2019
06:20 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Moody's Outlook Downgrade of Equifax: A Wake-up Call to Boards

The move provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

Wall Street has been abuzz this week over drastic measures by credit ratings agency Moody's to downgrade its rating outlook of Equifax, with expensive data breach fallout named as a major factor for the poor marks. While the action was not unexpected, the landmark nature of the outlook should provide some needed emphasis to both boards of directors and CISOs of the modern business imperative for cyber resilience, security and risk experts say.

"Today's news puts a punctuation mark on the business reality of cybersecurity risks," says Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, who believes this is going to push more boards to take in increasingly active role in understanding and managing cybersecurity risks. "They definitely need to do more than ask the CISO some high-level questions. Equifax is in the hot seat now, but most of the Fortune 500 CEOs and CISOs would do no better in the same situation."

CNBC broke the news last night of the note from Moody's changing its rating outlook that cited the $690 million in breach expenses — including costs for settling mounting class action lawsuits — and increased need for infrastructure investments to be made by the company through 2020 to address systemic cybersecurity weaknesses found in post-breach scrutiny.

Joe Mielenhausen, a Moody's spokesperson, told CNBC that "this is the first time the fallout from a breach has moved the needle enough to contribute to the change" in ratings outlook.

Equifax's record-breaking data breach, first disclosed in September 2017, was eventually found to have exposed the information of 147.9 million people. Technically the exposure was triggered through the exploitation of an unpatched Apache Struts vulnerability, but security industry experts and government officials say that more serious organizational problems and lack of executive oversight were the true culprit of what Congress called an "entirely preventable" breach. 

The fallout from the breach included the ouster of Equifax's CISO and eventually its CEO, and the company is still feeling the effects of class action suits from consumers and shareholder derivative lawsuits

"This is Moody's delivering on their intent last November to take cyber risk into account when grading companies," says Steve Durbin, managing director of the Information Security Forum. "This will certainly send a clear message to boards in a language that they understand that cyber risk is integral to business risk and that the implications of a breach or loss of data can have very real impact." 

Durbin says he's been advocating for some time to both the insurance industry and credit rating agencies to take cyber risk into account as they set policy pricing and assess company value. He believes this action by Moody's will set the tone for assessment of business health in the future.

"Moving forward, this should become the norm since cyber risk is so integral to business risk that an assessment of business health without taking cyber risk and a company’s resilience into account will become meaningless," he says.

Indeed, CNBC reported that Moody's hinted as such in its Equifax note, stating that it will increasingly scrutinize cybersecurity "for all data oriented companies" in the future.

Security insiders say that this Moody's action should not only be a wake-up call to CEOs and boards, but it's also a crucial inflection point for CISOs.

According to Laurence Pitt, security strategy director at Juniper Networks, it's another "chance in conversation" for security leaders — one that they shouldn't blow by lacking the right data or insights about organization-wide cyberrisk. 

"This incident changes how business will look at cybersecurity, so cybersecurity needs to change how it talks to business," he says.

Related Content: 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
5/28/2019 | 8:45:14 AM
One Lone Individual
How many place this into context of CEO testimony before Congress (slightly serious indeed) where he claimed it was ALL the fault of just one (1) security enginer, read that IT drone unit, who failed to perform a patch on a system.  WOW, THAT EASY?   Showed immense deaf and blind attitude by management and board and so this article SHOULD be read inlight of that horrendous judgment.  Oh, why is all the flak flying here?  Just one guy?  Hey, the CEO said so - it must be true, right?  
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15237
PUBLISHED: 2019-08-20
Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.
CVE-2019-15228
PUBLISHED: 2019-08-20
FUEL CMS 1.4.4 has XSS in the Create Blocks section of the Admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors.
CVE-2019-15229
PUBLISHED: 2019-08-20
FUEL CMS 1.4.4 has CSRF in the blocks/create/ Create Blocks section of the Admin console. This could lead to an attacker tricking the administrator into executing arbitrary code via a specially crafted HTML page.
CVE-2019-15231
PUBLISHED: 2019-08-20
Webmin 1.890, in a default installation, contains a backdoor that allows an unauthenticated attacker to remotely execute commands. This is different from CVE-2019-15107. NOTE: as of 2019-08-19, the vendor reports that "at some point" malicious code was inserted into their build infrastruct...
CVE-2019-15232
PUBLISHED: 2019-08-20
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.