Security Experts:

Connect with us

Hi, what are you looking for?


Incident Response

I’m a Fortune 500 Company and I’ve Been Hacked

One of the more interesting cyber security phenomenons I’ve witnessed recently is not only the willingness of CEOs to admit that their company has suffered a breach, but the enthusiasm in which they have shown in making the admission.

One of the more interesting cyber security phenomenons I’ve witnessed recently is not only the willingness of CEOs to admit that their company has suffered a breach, but the enthusiasm in which they have shown in making the admission.

In what seems like only a short-time ago, company management, often on the advice of legal counsel, had no appetite to discuss issues of cyber security. This was especially the case when it had been compromised. Yet here we are today and the leaders of some of the world’s best-known brands are “raising their hands” and talking openly about the subject. So what changed?

I believe the change in attitude is the result of external pressure from two separate, and potentially competing, sources. First, the Securities and Exchange Commission (SEC) has been encouraging greater transparency from public companies to disclose breaches, even if they don’t involve a material incident. By law, companies must disclose breaches that affect shareholder value. According to the National Conference of State Legislatures (NCSL), 46 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring notification of security breaches involving customers’ personal information.

Data Breach DisclosureThe threat of potential non-compliance with government standards has been a driving force in changing corporate policies on not only what should be disclosed in terms of a breach, but also when and how it should be disclosed. While negative public perception has always been a primary reason to remain quiet, when balanced against the threat of state and federal action, it becomes the lesser of two evils in the eyes of most board members and executives.

The second factor I see influencing the decision to “go public” as the victim of a breach is that trendsetting entities such as Apple, Google and Facebook have made it ok to do so. Once these companies, viewed as the leaders in Internet technology, came out and essentially said, “We’ve been hacked, this is how they did it, and this is what they were after,” it has in many ways become almost the fashionable thing to do, or at least less embarrassing.

I believe another motivating factor on this front has been the desire to draw attention to just how difficult it is to be secure. By making this an issue that all companies are dealing with, rather than a series of isolated, individual incidents, it limits the backlash and damage to brand reputation. As they say, there is strength in numbers.

However, I would like to offer some words of caution. Yes, it is an unreasonable expectation that any company with an Internet connection will not at some point in time suffer an attack. But, companies should be very careful about using the “It’s happening to everyone, there is nothing I can do” defense. This too is a cop-out in my opinion, and we are already seeing courts and industry overseers hold companies to a higher standard in that every reasonable step must have been to identify and mitigate the threat.

One of the major reasons the SEC and other government agencies have been applying pressure for disclosure and transparency is to help organizations work together to more quickly identify and control threats. When companies continue to work in silos, the same threat can make its way from organization to organization, sometimes undetected, for long periods of time. When threats are disclosed, the security industry has proven time and time again, to have the ability to shut them down quickly and control the damage.

The University of Santa Clara recently posted a debate on the business ethics section of their website that I would encourage everyone to read as it offers unique perspectives from both the public and corporate sides of this argument. The setup is below and the full post can be found here:

Cyber attacks on American companies have become increasingly more common, but not all companies respond to security breaches the same way. Companies such as Facebook, Twitter and Apple, have voluntarily gone public with their security troubles. Alternatively, a number of companies have continued to deny cyber attacks, despite reports stating otherwise; including, Exxon Mobil, Coca-Cola, Baker Hughes, and others. The U.S. government has encouraged transparency on cyber attacks as part of a wider effort to protect American intellectual property. Advocates of disclosing breaches claim it will set a precedent for other companies to get more active in fighting cyber attacks. The majority of company lawyers advise not to disclose, pointing to potential shareholder lawsuits, embarrassment and fear of inciting future attacks. Health and insurance companies must disclose breaches of patient information, and publicly traded companies must when an incident effects earnings. What policy should companies adopt when dealing with a cyber security breach?

Lots of great questions, unfortunately, there are no easy answers. I do however, find it extremely encouraging that we are having this debate and the issue is out in the open. This public discussion can only help lead us towards more effective security practices and processes.

Related Reading: National Data Breach Notice – Ever or Never?

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.