Skip to content

Board Pack (Equifax 2017 Cybersecurity Incident)

Use this to brief executives and counsel.


Purpose

This board brief provides decision-useful context for the 2017 Equifax cybersecurity incident and subsequent federal enforcement and civil proceedings: regulatory obligations, remediation posture, material risk themes, and specific oversight decisions requested from directors. It is designed to help the board evaluate governance adequacy, remediation priority, and reporting cadence across legal, technical, and operational dimensions.

Hallucinated writing examples

Scenario: In an illustrative period following the FTC stipulated order (July 2019) and parallel CFPB action (time), the Chief Information Security Officer (role) prepares a board security brief (type) for Board Audit Committee (audience).

MEMORANDUM

To: Board Audit Committee
From: Chief Information Security Officer
Date: October 15, 2020
Subject: Board Security Brief — 2017 Cybersecurity Incident; FTC and CFPB Orders; MDL and Remediation Status

This memorandum summarizes the September 2017 disclosure of unauthorized access to consumer credit file data affecting tens of millions of U.S. consumers, the Federal Trade Commission stipulated order entered July 22, 2019, parallel Consumer Financial Protection Bureau action, and ongoing civil MDL and settlement administration themes. Financial and injunctive terms should be confirmed against the final orders and counsel advisories.

Incident Summary: Public reporting and agency materials describe exploitation of a known critical vulnerability in an internet-facing application with access to sensitive consumer data in Equifax systems, together with related identity, access, and detection gaps. The Company disclosed the incident in September 2017, initiated remediation and consumer support programs, and has been subject to multi-year regulatory and civil oversight.
Federal enforcement imposed comprehensive information security program requirements, assessments, and consumer redress structures; civil proceedings added long-running discovery and governance scrutiny.

Regulatory and Legal Outcomes: The FTC and CFPB actions require sustained program investment, reporting, and third-party assessments. MDL litigation and settlement administration impose additional operational burdens for evidence production, expert disputes, and execution of consumer remedies. Management tracks milestones against consent frameworks and court-approved plans.

Control Failures and Root Causes: Agency findings and internal review have emphasized:

  1. Inadequate patch and vulnerability management discipline for internet-facing applications with paths to crown-jewel data stores;
  2. Over-privileged identity and access management paths enabling broad administrative access to sensitive consumer data;
  3. Insufficient logging, monitoring, and retention to support timely detection and forensic readiness;
  4. Governance and board reporting gaps relative to heightened supervisory and public expectations after the incident.

These areas are the focus of our remediation plan.

Remediation and Order Compliance: The Company is implementing mandatory patch SLAs for internet-facing assets, privileged access management with session monitoring, centralized SIEM coverage with defined retention, independent assessments with accountable remediation owners, and control-to-evidence mapping for regulatory and MDL requests. Progress is reported to compliance and legal leadership on a defined cadence.

Approval and Endorsement Requests: Management requests the Committee’s approval of capital for PAM and SIEM expansion; endorsement of executive patch SLA targets and exception governance with mandatory review dates; and confirmation of quarterly reporting on open critical findings, assessment closure rates, and redress-program support metrics.

Please let me know if additional information or further detail would be helpful.

Respectfully submitted,

Chief Information Security Officer

Document-type guide: Board Security Brief

Writing tips: Writing best practices — Board Security Brief

© 2026 Yi Zhang. Licensed under the MIT License.
Last updated: 2026 April 17 9:37 AM