Skip to content

Cyber Insurance News

The Leading Source for Cybersecurity Insurance News, Insights and Data

SecurityScorecard Report Highlights Escalating Supply Chain Cyber Risks for Global 2000

Posted on August 5, 2024August 5, 2024 By Martin Hinton

New research from SecurityScorecard and The Cyentia Institute reveals a stark reality for Global 2000 companies: 99% are directly connected to vendors that have experienced recent breaches. Prompted by new SEC cybersecurity requirements demanding transparency around third-party breaches, this report underscores the rising threat of multi-party supply chain attacks.

The report features a cover inspired by the 1999 Japanese film Godzilla 2000. The report notes the film’s tagline to explain the cover’s relevance. It says, “Earth’s most powerful monster fights a beast from outer space,” symbolizing the daunting challenge of supply chain cyber risk. While not alien, these risks originate outside an organization’s boundaries, and even the best defenses can be breached. (Editor’s note: it’s the coolest report cover we can recall seeing.)

What follows is our summary; you can get the full report here.

Escalating Risks in a Connected World

In today’s interconnected business environment, a vulnerability in one part of the supply chain can have ripple effects throughout the entire ecosystem. High-profile incidents involving Change Healthcare, MOVEit, and SolarWinds highlight the urgent need for robust supply chain cybersecurity measures. The report emphasizes that understanding and managing supply chain risks is essential to prevent disruptions and safeguard the foundational elements of our interconnected economy.

Key Findings:
  • Near-Universal Exposure: An alarming 99% of Global 2000 companies are directly connected to vendors that have experienced breaches.
  • Security Ratings: 70% of Global 2000 companies earn solid SecurityScorecard ratings, but 30% struggle to maintain a strong security posture.
  • Widespread Usage: 20% of these megacorporations utilize a thousand or more products.
  • High Costs: Supply chain incidents are 17 times more expensive to remediate and manage than first-party breaches.
  • Staggering Losses: Estimated total losses from breaches in the Global 2000 range between $20 billion and $80 billion over 15 months.
  • Breach Frequency: 12% of these companies experienced at least one security breach during the 15-month period of analysis.
  • Third-Party Relationships: The Global 2000 uses nearly 18,000 IT products/services from 8,000 vendors. In 69% of these relationships, vendors have a weaker security posture than their Global 2000 partner.
  • Concentration Risk: 90% of Global 2000 companies act as vendors to each other, exacerbating the risk of interdependence.
  • Common Vendors: At least 80% of Global 2000 companies use the top eight most widely deployed vendors, and four of the top five have reported recent breaches.
Understanding the Impact

Wade Baker, partner and co-founder at The Cyentia Institute, highlighted the scale of the issue: “While the Global 2000 boasts $51.7 trillion in revenue, their interconnectedness exposes them to severe cyber risks—with 99% directly connected to breached vendors and incidents that can tally into the tens of billions.”

Know Your Supply Chain

Supply chain events, such as malicious DDoS attacks or faulty patch updates, often deny users access to critical systems. To mitigate these risks, companies must continuously monitor their external attack surfaces, identify single points of failure, and automatically detect new vendors. This proactive approach is critical for maintaining cyber resilience.

Ryan Sherstobitoff, Senior Vice President of Threat Research and Intelligence, stressed the importance of managing supply chain risks: “The world is only beginning to grasp the potential for chaos caused by concentration risk. Understanding and managing your supply chain is critical to protect business continuity. It’s not just about preventing disruptions; it’s about safeguarding the very foundation of our interconnected economy.”

Methodology and Data Analysis

The Forbes Global 2000 ranks the largest companies worldwide based on sales, profits, assets, and market value, with the 2024 list accounting for $51.7 trillion in revenue, $4.5 trillion in profits, $238 trillion in assets, and $88 trillion in market value. This report focuses on the security posture and breach history of the Global 2000, examining the third-party vendors surrounding each company to understand cyber risks across their supply chains.

SecurityScorecard’s Automatic Vendor Detection capability was instrumental in identifying the vendors and products comprising modern organizations’ digital supply chain. SecurityScorecard continuously scans the internet to identify vulnerable and misconfigured digital assets, leveraging a global network of sensors and commercial and open-source intelligence sources.

Conclusion

The interconnected nature of modern business means that no organization is immune to the cascading effects of supply chain vulnerabilities. This report provides a comprehensive analysis of the risks facing Global 2000 companies and their third-party vendors, offering valuable insights for bolstering defenses and mitigating the impacts of third-party cyber threats. As Sun Tzu famously said, “Know your enemy…and know yourself.” For today’s organizations, this means knowing your supply chain and its potential risks.

Source: 99% of Global 2000 Companies Directly Connected to a Supply Chain Breach.

Other News: Supply Chain, Logistics and Cyber Insurance(Opens in a new browser tab).

Other News: Almost Three-quarters of Ransomware Victims Hit Multiple Times.

Cybersecurity, Cybersecurity Report Tags:cyber insurance, Cybersecurity, Global 2000, SecurityScorecard, Supply Cain Cybersecurity, supply chain, Supply Chain Cyber Risk

Post navigation

Previous Post: Cyber Insurance Sunday – Upload
Next Post: Inscora Secures $2M to Drive Cyber Insurance for Brokers

Related Posts

  • Third-Party Cyber Risks Endanger Insurance Industry: 59% of Breaches Linked to Vendors Cyber Insurance Best Practices
  • Cowbell Expands Cybersecurity Integrations to 30+ | Inside-Out Risk Insights for SMEs AI & Cybersecurity
  • Netwrix Reports Sharp Increase in Cyberattacks and Consequent Business Losses Cybersecurity
  • Dragos Announces Partnerships to Enhance OT Cybersecurity Incident Response Cybersecurity
  • Beazley Security Expands Leadership to Support Growth in US and Europe Cybersecurity
  • The Critical Role of Identity Security – Delinea’s 2024 Cyber Insurance Report Cyber Insurance Reports

Get the Cyber Insurance Newsletter

Receive weekly updates on the top news on cyber insurance.

Cyber Insurance News

Cyber Insurance News
In this clip from our latest podcast, Martin Hinton and William Altman dive into the long-term consequences of data breaches — especially those affecting K–12 students. Highlighting the PowerSchool breach, which exposed 60 million student records, they explore how leaked personal data like mental health history may resurface decades later, leaving individuals vulnerable to fraud, identity abuse, and digital exploitation.

Altman warns that while credit monitoring may address financial risk, it fails to protect against deeper psychological and reputational harm. This conversation is a must-hear for educators, parents, and policymakers thinking beyond immediate breach responses.

🔗 Learn more at www.cybcube.com/
#Cybersecurity #StudentPrivacy #DataBreach #PowerSchool #CyberRisk #IdentityTheft #DigitalSafety #CyberInsurance
Education Cybersecurity Exposed: Long-Term Impact of K–12 Cybersecurity Breaches
The threat of cybersecurity breaches in 2025 and the long-term damage of a cyberattack. In this episode of the Cyber Insurance News Podcast, Executive Editor Martin Hinton interviews William Altman, Head of Cyber Threat Intelligence at CyberCube. They explore the evolving world of cybersecurity and cyber insurance. The episode dives into why small businesses are highly vulnerable, how AI is both a weapon and a shield in cyber defense and the critical gaps in threat intelligence. They also discuss basic measures even the smallest business can take to protect themselves from a cybersecurity breach. 

A spotlight is cast on the education sector, where underfunded cybersecurity programs have made schools a prime target for threat actors. These cybersecurity breaches can have a lasting impact. One alarming breach compromised 60 million K-12 student records, revealing sensitive data like mental health histories, data that can't be “reset” like a credit card. This breach raises urgent concerns about the long-term impacts of cybercrime on students' privacy, identity, and future safety, far beyond the limits of traditional credit monitoring.

They also explore the security posture of the financial sector, the power of identity and privileged access management, and the real-world impact of software vulnerabilities.

🔐 KEY TOPICS:

Cybersecurity strategies for small businesses

The widening cyber insurance protection gap

How AI is used in phishing and threat reconnaissance

Managing software vulnerabilities and patch cycles

Cybersecurity in education and financial sectors

Global threat intelligence trends

📌 Takeaways:

MFA significantly reduces attack success rates.

Small businesses and schools are increasingly at risk.

Sensitive student data breaches have lifelong consequences.

AI is making phishing more personalized and efficient.

MSPs can be critical vulnerabilities in your cyber chain.

💡 Essential Cybersecurity Resources for SMBs:

🔗 NIST Cybersecurity Framework

🔗 CIS Critical Security Controls

👉 Subscribe for more expert interviews and visit @cybercube4461 for more insights. 

#cybersecuritybreaches2025 #cybersecuritybreaches #cyberinsurance #AIinCybersecurity #studentdatabreach #smallbusinesssecurity #educationcybersecurity #dataprotection #CyberCube #MFA #cyberrisk

Chapters
00:00 Introduction to Cyber Threat Intelligence
02:58 Understanding the Cyber Insurance Landscape
05:55  The Vulnerability of Small Businesses
08:54 Practical Cybersecurity Measures for Small Businesses
12:04 The Role of Education in Cybersecurity
18:07  The Long-Term Impact of Data Breaches
27:01 Cybersecurity in the Financial Sector
29:01 The Risks of Common Technologies in Finance
31:15 AI: The Double-Edged Sword in Cybersecurity
35:40 The Evolving Threat Landscape with AI
39:11 Global Cybersecurity: Regulations Matter
42:15 Cybersecurity Essentials for Small Businesses
Cybersecurity Breaches 2025: Small Business, AI & Education Breaches.
In the wake of the Harrods hack and cyberattacks impacting other retailers, the alarming state of UK cybersecurity will be revealed in 2024. From cyberattacks hitting major UK retailers like Co-op and Harrods to small businesses struggling without protection, the message is clear—cybercrime is a national threat.

New research by Pen Underwriting reveals that while 90% of UK and Irish businesses feel secure, only 47% have dedicated cyber insurance. Even more shocking—only 18% of businesses earning under £1 million are covered. The cost isn’t just financial—real people suffer, like the couple who lost their wedding cake due to a ransomware attack.

Watch now to understand:

Why UK businesses are dangerously unprepared

How cyberattacks are more common than fires or theft

The key role of employee training, data backups, and multi-factor authentication (MFA)

Why cyber insurance is no longer optional

Visit www.cyberinsurancenews.org for the latest cyber insurance and cybersecurity updates.

#UKCybersecurity #CyberInsurance #SmallBusinessSecurity #CyberCrime
Harrods hack UK Cybersecurity Crisis: Shocking Stats, Real Victims & Business Risks. #cybersecurity
Load More... Subscribe

Categories

  • AI & Cyber Insurance
  • AI & Cybersecurity
  • Critical Infrastructure cyber insurance and security
  • Cyber Cat Bonds/Cyber Catastrophe Bonds
  • Cyber Insurance
  • Cyber Insurance APAC
  • Cyber Insurance Best Practices
  • Cyber Insurance Captive
  • Cyber Insurance Carriers & Brokers
  • Cyber Insurance Claims
  • Cyber Insurance EU
  • Cyber Insurance Financial Institutions
  • Cyber Insurance for Government
  • Cyber Insurance for Healthcare
  • Cyber Insurance for Schools
  • Cyber Insurance for SMEs/SMBs
  • Cyber Insurance For Startups
  • Cyber Insurance for Utilities
  • Cyber Insurance Geographic Markets
  • Cyber Insurance Industry Groups
  • Cyber Insurance Investments and M&A
  • Cyber Insurance Jobs
  • Cyber Insurance Laws & Regulations
  • Cyber Insurance Litigation
  • Cyber Insurance Market Size
  • Cyber Insurance MENA
  • Cyber Insurance News & Information Podcst
  • Cyber Insurance People
  • Cyber Insurance Policies & Strategies
  • Cyber Insurance Premiums
  • Cyber Insurance Reports
  • Cyber Insurance Settlements
  • Cyber Insurance Sunday – Upload
  • Cyber Insurance Systemic Risks
  • Cyber Insurance Tech
  • Cyber Insurance Threats
  • Cyber Insurance UK
  • Cyber Insurance Underwriting
  • Cyber Insurance Wholesaler
  • Cyber Regulations
  • Cyber War Exclusions
  • Cybersecurity
  • Cybersecurity and Credit Ratings
  • Cybersecurity for SMBs
  • Cybersecurity in Education
  • Cybersecurity Investment
  • cybersecurity jobs
  • cybersecurity M&A
  • Cybersecurity people
  • Cybersecurity Report
  • Cybersecurity Training
  • Department of Homeland Security
  • EU Cybersecurity
  • Insurance Linked Securities/ILS
  • Insurance Loss Warranty contract/ILW
  • Managed Service Providers
  • National Association of Insurance Commissioners' (NAIC) model cybersecurity law
  • Non-criminal Claims/Non-Malicious Claims
  • Opinion/Commentary
  • Personal Cyber Insurance
  • Personal CyberSecurity
  • Ransomware Insurance
  • Reinsurance
  • Risk Modeling
  • SEC Cyber Disclosure Rule
  • Small Business
  • Supply Chain Cybersecurity And Insurance

Send Ideas, Requests & Comments




    Tags

    AI Artificial Intelligence At-Bay Beazley CFC Chubb Cloud Security Coalition Corvus Cowbell Cowbell Cyber crowdstrike cyber attack Cybercrime cyber crime CyberCube cyber insurace cyberinsurance cyber insurance cyber insurance for small businesses Cyber Insurance Market Cyber liability Insruance cyber liability insurance cyberliabilityinsurance Cyber Resilience Cyber Risk Cyber Risk Management cyber security Cybersecurity cybersecurity insurance Cyber threats Data Breach Howden Lloyds Marsh Microsoft personal cyber insurance phishing Ransomware Ransomware Insurance reinsurance Resilience Risk Management SecurityScorecard small business
    • Cyber Insurance Books
    • Cyber Insurance Reports & Documents
    • Cyber Insurance Acronyms/Terms
    • Cyber Insurance Companies: Carriers, Brokers & Vendors
    • Industry Response: Potential Federal Insurance Response to Catastrophic Cyber Incidents
    • Ransomware Insurance
    • How Much Is Cyber Insurance?
    • Considerations for Buying Cyber Insurance
    • Cyber Liability Insurance Near Me
    • Cyber Insurance Quote
    • Newsletter
    • Legal Analysis & Full Text of 2023 SEC Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
    • Glossary
    • About Cyber Insurance News
    • Privacy Policy

    • Consortium of Leading Cyber Insurance Carriers Creates New Company to Coordinate on Cyber Market Cyber Insurance Best Practices
    • Open Wide! Cyber Insurance for Dentists…  Cyber Insurance Policies & Strategies
    • Cyber Insurance Premiums to Spike 30% this Year, Predicts Risk Strategies — But a Silver Lining? Cyber Insurance Best Practices
    • Cohesity Report Highlights Overconfidence in Cyber Resilience Amid Rising Threats Cybersecurity
    • Falcon Risk Services Introduces FalconFlight: Cyber and Professional Liability Insurance Cyber Insurance
    • American Water Won’t Discuss Cyber Insurance as Huge Utility Recovers from Cyber Attack; Hack Follows USG Warnings About Threats to Water Utilities Cyber Insurance
    • SeedPod Cyber and Seceon Partner to Boost Cybersecurity and Insurance Savings for MSPs/MSSPs Cyber Insurance
    • Cyber Insurance Claims Surge: BEC and Fraud Top Coalition’s Report on 2024 Insurance Claims Cyber Insurance Reports

    Related Cybersecurity Sites

    http://www.whatiscyberliability.com

    https://www.whatiscyberinsurance.com

    http://www.ddosattacktutorial.com

    http://www.ransomwareremovaltool.com

    Our Privacy Policy: https://cyberinsurancenews.org/privacy-policy/

    Copyright © 2024 Cyber Insurance News.

    Powered by PressBook Premium theme