No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Winds of Warning? SEC Charges Threaten to Disrupt Role of CISO

Regulator’s case against individual leader is more stick, less carrot

by Paul Caron
April 3, 2024
in Cybersecurity, Featured
solarwinds corporate building

SEC allegations against a cybersecurity executive over a 2020 cyber incident have sent ripples through the industry. Paul Caron of cybersecurity consultancy S-RM digs into the case and explains why it could have a chilling effect on CISO employment.

In October, the SEC made an unprecedented move, suing the victim of a cyber attack rather than using its traditional enforcement move of charging and simultaneously settling with companies that run afoul of regulatory obligations. When the SEC filed charges against SolarWinds, a software company that fell victim to a massive cyber attack in 2020, it also charged the company’s chief information security officer, Timothy Brown, alleging that the CISO defrauded investors by hiding cybersecurity weaknesses.

While the case is in dispute (SolarWinds has filed a motion to dismiss the charges), there is no question that the SEC’s actions have created widespread concern among CISOs. Before the agency’s charges, CISO was a notoriously difficult position to fill, and many companies now worry they will have more trouble finding the right person — or have to pay a lot more money to convince them to accept the potential risk of personal legal consequences.

Could a new era of personal liability be dawning for cyber risk? What does this do to the makeup of the traditional C-suite? And are today’s CISOs under such pressure to maintain a competitive edge that making false or inflated claims is more commonplace than it might have been a few years ago?

Poor enterprise cybersecurity leads to a false sense of maturity and posture

At the heart of the claim against Brown are internally misleading statements and claims on the overall status and state of the internal controls landscape at SolarWinds. These may seem like the actions of a rogue actor on the surface, but they portend a much larger and concerning trend in enterprise cybersecurity. For large companies, cybersecurity maturity and posture are often assessed and tracked in complex ways. One common method is to score control domains on a simple scale (think 1-5 with 1 being immature and 5 being unattainable perfection) that can be repeated year over year to demonstrate maturity score changes and areas of shifting focus. Unfortunately, this type of scoring can often lead to obfuscation of larger risks.

CISO performance will often be judged by these scores, incentivizing higher scores, which can and will lead to larger issues. For example, a CISO of a cash-strapped organization may elect to commit their team’s time and energy to resolution of lower-impact risks that are cheaper to address. This is sometimes referred to as “chasing decimal points.” In this example, the overall maturity score would go up incrementally, but the organization would not have directly addressed the biggest risks. Alternatively, a CISO or their team may inadvertently inflate scores year over year, as they believe performance has improved, despite no material changes being made to the security posture. Each of these instances could represent fraudulent representations of the organization’s overall security posture and put the offending CISO in regulatory trouble.

front of sec building
Cybersecurity

CISOs Can Use New SEC Cyber Rules to Their Advantage

by Jose Seara
February 19, 2024

Translate cyber risk to plain business speak

Read moreDetails

Could the SEC ruling become the catalyst for CISOs leaving organizations? 

The role of a CISO is already a very tumultuous position to sustain and fill, the current employment market making it difficult to find the right talent for these critical hires.

The SEC’s move will put a bigger divide between the CISO and the traditional C-suite in the future. There is already an unforeseen bifurcation between accountability for what the CISO is responsible for and actually getting that across the line. So, unfortunately, while a CISO’s regular remit is to bring risks upstream to the CFO and CEO, they’re ultimately not the ones who have a true mandate or authority to put it into action. By suing an individual CISO, the SEC is adding further complication — more stick, less carrot — to the talent acquisition and retention landscape.

And since the SEC appears to be shifting security liability to CISOs, organizations must prove they are willing to support and protect their CISO by providing them the resources (read: budget and headcount) they need to maintain a property cybersecurity program. Otherwise, good talent will simply not be willing to accept the risk.

Protecting CISOs & organizations often means scrutinizing vendors

The additional scrutiny placed on CISOs stems in part from the evolving role of software. A decade ago, most organizations maintained and managed their own IT stack, they owned their own servers, and they ran their own data centers. Now software is a service. This means organizations are placing much more trust in third-party vendors. Because third parties sometimes outsource client data to fourth or fifth parties, even if a third party is vetted, the threat of a data breach still lingers. The interwoven nature of modern software underscores the need for visibility all the way through the suppliers of our suppliers. By gaining transparency into every step of the data lifecycle, organizations can minimize risk, ease compliance and alleviate some of the burden placed on the CISO.

However, implementing visibility tools takes time and capital. Organizations shouldn’t wait for the latest transparency technology to secure their data — there are several low-cost, immediately impactful steps organizations can take to mitigate third-party risk.

  1. Gain an in-depth understanding of the vendor landscape. Large organizations with expense budgets are especially guilty of committing to partners before conducting a complete survey of the vendor landscape.
  2. Determine the functions of the business which absolutely require third-party vendors. This will allow organizations to see which processes already performed by third-party vendors are unnecessary or better performed in-house.
  3. Devise a plan for governance for the operationally critical third-party vendors. The IT and security teams, as well as the business owner, need to work in sync during this step to thoroughly perform due diligence. Organizations in less-regulated industries should take advantage of the clean slate they have when creating governance and tailor the plan to suit their organization’s unique needs.
  4. Draft contractual obligations. Often with cloud computing platforms, a CISO will hastily agree to a contract, without realizing that various security measures are not included in baseline packages.
  5. Develop an exit strategy. If during a future date, the organization deems a third-party vendor too risky, they’ll need to cleanly sever ties with the vendor, ensuring the vendor no longer has any of the organization or their client’s data. In the age of artificial intelligence, determining who has access to private data becomes even more important.

Ideally, these several steps should be part of a larger change in corporate culture, viewing the mitigation of third-party risk holistically, rather than the sole responsibility of the CISO. When it comes to vetting vendors and securing data, communication between the IT, security, and executive teams needs to be heightened, and responsibility equally distributed. Once the CISO isn’t viewed as a scapegoat, organizations can attract top talent and modernize their security practices.

 


Tags: Cyber Risk
Previous Post

Game Plan: As the Workforce Gets Younger, Gamifying Training Makes More Sense

Next Post

SEC: Self-Reporting Is Biggest Factor in Assessing Recordkeeping Fines

Paul Caron

Paul Caron

Paul Caron is the Americas head of cybersecurity at S-RM, a global corporate intelligence and cyber security consultancy. He has more than 20 years’ experience spanning both the private and government sectors and across a variety of roles, including military intelligence and counter terrorism, and cybersecurity leadership and engagement delivery. Before joining S-RM, he was the managing director of incident response for a global consulting firm. In this role, he used his experience to help clients who were experiencing complex ransomware attacks.

Related Posts

news roundup green bars

In-House Counsel Salary Increases Slow

by Staff and Wire Reports
May 2, 2025

Majority of execs predict rise in fincrime in ’25

data abstract green purple

66% of CISOs Worry Cyber Threats Are More Advanced Than Companies’ Defenses

by Staff and Wire Reports
April 25, 2025

US business sector falling behind in adoption of renewable energy

robot hand pointing to sky

Agentic AI Can Be Force Multiplier — for Criminals, Too

by Steve Durbin
April 21, 2025

How polymorphic malware and synthetic identities are creating unprecedented attack vectors

data abstract pixelated

GenAI Adoption Surging in Professional Services

by Staff and Wire Reports
April 18, 2025

Fewer than 1 in 3 organizations consistently meet cyber compliance standards

Next Post
sec building

SEC: Self-Reporting Is Biggest Factor in Assessing Recordkeeping Fines

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights