BreachExchange mailing list archives
What's your cybersecurity whistleblower strategy?
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Tue, 5 Jan 2016 17:16:21 -0700
http://www.csoonline.com/article/3018853/leadership-management/whats-your-cybersecurity-whistleblower-strategy.html It reads like a security nightmare. An employee, maybe even someone in IT, contacts a government regulator and reports major vulnerabilities in the company’s infrastructure. The employee says the company knows about the problems but has done nothing, putting people's personal data or maybe even their physical safety at risk. Even worse, the whistleblower claims to have been punished for complaining too much to management about the problems. An investigation ensues, forcing the company to hire attorneys and consultants, and the regulator levies a hefty fine when several accusations prove accurate. Finally, the whistleblower is given a portion of that judgement, financially rewarded for exposing their employer’s dirty laundry. When I discuss this scenario with other security professionals, many see it as a classic case of insider threat. The fictive whistleblower is blasted as unprofessional, spiteful, a traitor even. That reaction may be understandable, but it is increasingly misinformed and dangerous. Whistleblowers will be coming to cybersecurity, and a strategy built around blaming and demonizing them will actually make things much worse. In 2015, the Securities and Exchange Commission (SEC) settled charges that R.T. Jones Capital Equities Management violated the “safeguards rule” by not doing more to prevent a security breach that compromised the information of about 100,000 people. Even though no one appeared to be harmed, the SEC censured R.T. Jones and fined the firm $75,000. Justifying the enforcement, the SEC said, "Firms must adopt written policies to protect their clients’ private information and they need to anticipate potential cybersecurity events and have clear procedures in place rather than waiting to react once a breach occurs." The security community has not really considered whistleblower risks, which is somewhat surprising given an ongoing parade of large public breaches, and the common knowledge that many organizations do a poor job of securing their systems and data. Though there seems to be no whistleblower involvement in the R.T. Jones case, it has been a sort of catalyst. In response to lawmaker pressure to crack down on companies that fail to prevent breaches, Kara Stein, the SEC Commissioner, wasquoted after the settlement saying her agency intended "...to play a much more active role in trying to help companies better protect themselves against an increasing number of cyber security issues in a world in which we are all increasingly connected." Effective enterprise security is not yet formally synonymous with ethical corporate behavior. When security professionals discuss ethics, the tone can be somewhat ambiguous or focused on certification requirements rather than engaging the deeper question of whether companies have an ethical duty to make security work properly. If companies have such a duty, the calculus changes. Neglecting or underfunding security is no longer just a business decision, but has ethical repercussions as well. So maybe it should come as no surprise that regulators and other entities, like law firms, are thinking about the possibilities of cybersecurity whistleblowers. The R.T. Jones settlement was relatively small, but the fine seemed to be less important than the precedent. Reactions and interpretations from the case should be a wake-up call for security professionals, compliance officers, and organizations in general. Attorneys, for instance, have become interested in the implications of the R.T. Jones settlement. Although no recent public breaches are known to involve whistleblower complaints, lawyers seem to smell opportunity. Some now offer to help whistleblowers expose security problems, particularly if they’ve had trouble reporting them internally. Others offer legal services for companies dealing with investigations or lawsuits. Many see the market for these services only getting bigger. "It is only a matter of time...before we see a headline announcing that a hacked company knew about its vulnerabilities yet did nothing to protect its customers, but instead fired the whistleblower who identified and sought to fix the problem." The SEC regulates financial firms, and runs its own whistleblower program. But whistleblower programs also exist in the automotive industry, healthcare, and government, all sectors where security breaches have made major headlines, fromJeep hacking to medical privacy to the OPM. Cybersecurity has remained esoteric enough to avoid direct connection to cases of corporate fraud or product liability. But embedded software and the growing Internet of things will increasingly make those distinctions weaker and less convincing. Future security stakeholders may be less able to disassociate their actions from direct consequences and personal responsibility. Could a developer be more motivated to report, believing their firm's software product might harm or even kill someone? Might a fired CISO launch a wrongful termination suit against an employer, claiming a failure to provide adequate security resources prior to a breach? These are the dilemmas that create whistleblowers. So what's a rational cybersecurity whistleblower strategy? The only effective way to manage the risk is to develop a culture that actively embraces those whistleblowers. You must motivate people to report problems within the enterprise. Research shows that most whistleblowers are not disgruntled employees acting out of greed or spite, but good workers (often managers) honestly trying to fix problems they believe will cause people or the company harm. They go outside because they worry no one is listening inside or, worse, that management will “shoot the messenger” and retaliate against them. But a cyber hotline or a beefed-up security awareness program means nothing if the organization doesn’t move quickly to fix reported problems. Ironically, the best whistleblower strategy is for the organization to truly hold itself accountable for identifying and fixing security problems. Imagine an organization where, when people pointed out bad security, senior management took action as quickly and aggressively as if someone reported accounting fraud, safety violations, or sexual harassment? What would security look like in that organization? If nothing else, it would look like a place with far fewer whistles waiting to be blown.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) Need access to data breach details or alerts when new breaches happen? Risk Based Security's Cyber Risk Analytics portal, fueled by the RBS breach research team, provides detailed information on how data breaches occur and which vendors to trust. Contact us today for a demo.
Current thread:
- What's your cybersecurity whistleblower strategy? Audrey McNeil (Jan 06)