Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Equifax Chief Information Security Officer Was An Affirmative Action Hire
thelibertyconservative.com ^ | September 13, 2017 | Alex Witoslawski

Posted on 09/16/2017 8:01:50 PM PDT by grundle

Following a security breach that exposed the credit information of 143 million people to hackers, it was revealed that Equifax Chief Information Security Officer Susan Mauldin was a music major in college.

Equifax, which is a credit reporting agency, hired Mauldin as their Chief Information Security Officer in 2013. Previously, Mauldin was the Senior Vice President and Chief Security Officer at First Data Corporation until 2013. Prior to that, she was also SunTrust Banks’ Group Vice President from 2007 to 2009.

How she got any of these positions, or the skillset required for them, is still an open question considering her educational background. According to her LinkedIn Mauldin did not have any technology or security credentials. Instead, she got a bachelor’s degree and a Master of Fine Art’s degree in music composition from the University of Georgia.

There’s been virtually no coverage of Mauldin’s credentials following the security breach but, as ZeroHedge has pointed out, Equifax scrubbed Mauldin’s LinkedIn and took down videos and podcasts with her. Since then, Mauldin has resigned from her position as Equifax’s CISO.

Could this all have been done in an attempt to hide that the individual that Equifax put in charge of protecting 143 million American’s credit information was an affirmative action hire meant to meet some quota?

That still remains to be seen, though we do know that Equifax, like most other major corporations, has diversity programs in place – indicating that their hiring process may also put a premium on women and racial minorities over white men. This is supported by the fact that the security breach and the handling of it since then both indicate that Susan Mauldin had no idea what she was doing.

As Lily Hay Newman at Wired and security journalist Brian Krebs have documented, Equifax committed an embarrassing series of mistakes that led to the security breach and then left multiple vulnerabilities in the following months.

The breach itself happened because Equifax was using an old web application that had not been updated – despite the fact that a security update that would have prevented the breach was made available two months prior to the incident. Following the breach, Equifax took six weeks to notify the public that it had occurred. Then, they set up a web portal for handling credit disputes with the username of “admin” and the password of… you guessed it, also “admin.”

But hey – diversity is our greatest strength, right?


TOPICS: Miscellaneous
KEYWORDS: equifax; mauldin; securitybreach; susanmauldin
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last
To: Reno89519

Oh. everyone knows that proprietary software is 100% bullet proof. /sarcasm


21 posted on 09/16/2017 8:48:27 PM PDT by central_va (I won't be reconstructed and I do not give a damn.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: grundle

My work place hired a Mexican supervisor I think for affirmative action reasons. Next thing I know we have the system down for 3 days because he wants to be the person to fix the problem and critical system instead of getting the right people to work on the problem.

I’m a programmer but I do a bit scripting on the system side of things so I check if our Apache web servers are patched up after I read about the details of the equafax hack. They haven’t been patched in over 9 months and are vulnerable. I alert him to this fact and he shrugs it off. He says they’ll patch the test servers next week sometime and then get around to doing the live ones eventually. I can even fathom how people deal with IT people who don’t take things seriously. But that’s what you get with affirmative action.


22 posted on 09/16/2017 8:50:05 PM PDT by JohnyBoy (We should forgive communists, but not before they are hanged.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grundle

Pretty damn stupid if true.


23 posted on 09/16/2017 8:50:41 PM PDT by Bullish (Whatever it takes to MAGA)
[ Post Reply | Private Reply | To 1 | View Replies]

To: gaijin

She should have been in charge of the church choir and not responsible for the entire nations credit files.


24 posted on 09/16/2017 8:50:44 PM PDT by central_va (I won't be reconstructed and I do not give a damn.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Reno89519

Most people would take the opposite view. An open source framework like Struts is supposed to be written by highly experienced programmers, and thoroughly tested in thousands of applications. It handles the nuts and bolts so each application doesn’t have to re-create them individually. The code your mixed lot of programmers write is highly likely to have many more flaws than well-vetted open-source software.

The downside, of course, is that if open-source does turn out to have a serious flaw, hackers will try every web site on the web to see if it is vulnerable. They will get many hits.


25 posted on 09/16/2017 8:53:47 PM PDT by proxy_user
[ Post Reply | Private Reply | To 19 | View Replies]

To: drpix

If miss Dick is in a lesbian relationship, may we assume she plays the dominant role, given her name


26 posted on 09/16/2017 9:31:17 PM PDT by faithhopecharity ("Politicans are not born, they're excreted." -- Marcus Tillius Cicero)
[ Post Reply | Private Reply | To 18 | View Replies]

To: ButThreeLeftsDo

Different article.


27 posted on 09/16/2017 9:59:41 PM PDT by moovova
[ Post Reply | Private Reply | To 4 | View Replies]

To: Fhios

I remember reading that lots of early spammers were inside jobs (pre botnet days). Somebody would back a truck of a couple of servers up to a site, the inside guy would run some cables out to the truck, and up went the spam. Lots of people looking for ways to pick up a few bucks.


28 posted on 09/16/2017 10:06:55 PM PDT by ProtectOurFreedom
[ Post Reply | Private Reply | To 9 | View Replies]

To: gaijin
RIDICULOUS..!

Agreed, how they could allow anyone from the University of Georgia in the role of CIO is preposterous.

29 posted on 09/16/2017 10:09:26 PM PDT by dfwgator
[ Post Reply | Private Reply | To 2 | View Replies]

To: dfwgator

“Agreed, how they could allow anyone from the University of Georgia in the role of CIO is preposterous. “

Several other blogs on Susan’s problem are saying she most likely got the job by hanging out at the local Jewish Community Center.


30 posted on 09/16/2017 10:11:39 PM PDT by vette6387 (LOCK HER UP! COMEY TOO.)
[ Post Reply | Private Reply | To 29 | View Replies]

To: proxy_user

What’s your deal ?

She was a diversity hire (only one out of three points) and you’re good with that, right?


31 posted on 09/16/2017 10:57:05 PM PDT by A strike (Academia is almost as racist as Madison Ave.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: proxy_user

Are you her lover?


32 posted on 09/16/2017 10:59:09 PM PDT by A strike (Academia is almost as racist as Madison Ave.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: gaijin

F Equifax and all their employees. And their guilty until proven innocent business policies. Glad to see this happen to them.


33 posted on 09/16/2017 11:34:57 PM PDT by Dr. Pritchett
[ Post Reply | Private Reply | To 2 | View Replies]

To: proxy_user

Nonsense!


34 posted on 09/16/2017 11:47:04 PM PDT by reardensteel
[ Post Reply | Private Reply | To 8 | View Replies]

To: grundle

Lesbian? Or Black?


35 posted on 09/17/2017 3:07:53 AM PDT by Ann Archy (Abortion....... The HUMAN Sacrifice to the god of Convenience.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grundle

content of character not the color of your skin, MLK, REPUBLICAN


36 posted on 09/17/2017 3:20:54 AM PDT by ronnie raygun (Trump plays chess the rest are still playing checkers)
[ Post Reply | Private Reply | To 1 | View Replies]

To: central_va
"She should of had “secret” staff dedicated to breaching security unknown to the actual IT department staff."

They should have hired you.
37 posted on 09/17/2017 3:21:18 AM PDT by Garth Tater (Gone Galt and I ain't coming back.)
[ Post Reply | Private Reply | To 12 | View Replies]

Comment #38 Removed by Moderator

To: central_va
She should of had “secret” staff dedicated to breaching security unknown to the actual IT department staff.

This is known as black-box vulnerability assessment and is very common in many industries. I'm curious if Equifax was bound by PCI or regularly audited?

I work in financial services and we are audited by at least 3 different entities at least once per year by each, and for PCI, we are required to pass audit twice a year. If we don't pass audit, we lose a majority of our customer base. Not sure how Equifax got away with this.

39 posted on 09/17/2017 3:48:16 AM PDT by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: dfwgator

I linked to a photo which did not display.

HadLater it properly displayed, you would probably have agreed with what I typed.


40 posted on 09/17/2017 3:53:11 AM PDT by gaijin
[ Post Reply | Private Reply | To 29 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson