Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityManagementCyber Tactics ColumnSecurity Leadership and ManagementSecurity & Business Resilience

Cyber Tactics

Have we declared “open season” on CISOs?

As security executives are increasingly named in lawsuits related to enterprise cybersecurity, there are a number of precautions CISOs should keep in mind.

By John McClurg
Cyber tactics

putilich / iStock / Getty Images Plus via Getty Images

cyber tactics author
Cyber tactics
cyber tactics author
February 13, 2023

A couple of recent cybersecurity-related court cases brought back autumnal memories of growing up in the mountains of Utah. Those memories unavoidably included the sights and sounds of the annual deer hunt. Everyone in town knew when it was “open season.” In a somewhat disquieting manner, I’m sensing what strikes me as parallels between that world and that in which we as chief information security officers (CISOs) now live. Open season has been declared on CISOs.

The cases that triggered that impression include that of Joe Sullivan, former Chief Security Officer (CSO) of Uber, who is being criminally prosecuted for covering up a data breach, and that of Tim Brown, CISO of SolarWinds, who was sued in civil court.

As security executives are increasingly made the subjects of cyberattack litigation, there are a number of precautions CISOs should keep in mind.


Suing the CISO

Last year, a district judge allowed most of an investor lawsuit against SolarWinds to proceed. This specific case — fallout from the SUNBURST attack against the company — named the SolarWinds CISO (among others) and alleged that he displayed “severe recklessness” when he enthusiastically touted the security measures implemented at SolarWinds.

“Plaintiffs assert Brown’s title was Vice President of Security Architecture, he often appeared in interviews endorsing SolarWinds’ cybersecurity efforts, he was the face (literally) of the Security Statement page on the company’s website, and he addressed cybersecurity issues when they arose.”

SolarWinds countered that the case was without merit and should be dismissed:

"The Complaint does not contain a single factual allegation supporting any inference, much less a cogent and compelling inference, that the SolarWinds defendants intended to deceive investors into believing that SolarWinds was immune to cyberattacks or otherwise spoke with severe recklessness such that investors would draw that conclusion."

The court largely rejected their argument and toward the end of 2022 the company announced its intention to settle this lawsuit for $26 million. Since joining the CISO proved profitable in this case, there’s every reason to anticipate that future data breaches and cyberattacks may spawn additional class-action suits naming security leaders. Many plaintiff’s attorneys and their associated law firms avariciously watch case law precedent and pivot based on what works.


Prosecuting the CISO

Undoubtedly by now, you’ve also heard about former Uber CSO Joe Sullivan. He’s looking at up to 8 years in jail, following his conviction on charges related to the company’s 2016 data breach. Reportedly, this was the first time an executive faced federal criminal prosecution over response to a data security incident.

As I wrote in a recent column, a season of “attestations” is coming up later this year as the deadline for cybersecurity Executive Order 14028 approaches. This is an important, long-needed step in improving software supply chain security. Understandably, the pressure on cybersecurity leaders is likely to increase, as corporations turn to them as their attesters. If in the wake of such attestations a breach should occur, it’s disconcerting to think that one’s fate could lie in the prosecutorial discretion of an assistant United States attorney whose career aspirations could incline them toward prosecution.


Protecting the CISO

Time will only tell where all of this will take us. For now, however, these cases raise a red flag that CISOs ignore at their peril — a clarion indication of the very real possibility that they could be singled out and judged, based on their actions, e.g. attestations, or inactions, and held personally exposed in the litigation following a cyber incident. As a result, a re-examination of indemnification and how it’s applied in corporations seems appropriate. During my career, this has never been a significant point of conversation. Apparently, given the current environment, that now needs to change.

Can one be considered an “insured person” under an organization’s Director and Officers (D&O) coverage? How are “director” and “officer” defined? Many, if not most, public corporations define them narrowly, excluding a CISO from those called out in SEC Section 16 as officers, alleging that there are instead various statutory and common law indemnification provisions covering them and other employees of the corporation. These things are typically specified within one’s corporate policy. Cybersecurity leaders are, then, often overlooked when it comes to this type of D&O coverage, even though they rank as VPs or higher and are responsible for managing data breaches, the average of which costs millions and can disrupt one’s entire organization.

This clearly begs the question of whether one has discussed this situation with legal counsel. Is your organization protecting you or are they willing to? How is that documented?

Now, more important than ever, is the consideration of the following ideas:

  • The inclusion of cyber incident disclosure guidelines in your incident response plan because what you say or do not say (and when) will be scrutinized after an incident.
  • If you report to the board, the inclusion in board minutes the organization’s ongoing efforts to mitigate cyber risk.

The disparity in the application of indemnification provisions makes one wonder: Are we all truly “in the boat together” — rowing collaboratively — if only some in the boat are indemnified?

Open season on CISOs is apparently just emerging. That makes this the right time to have these conversations, exploring one’s options. Our plates as cybersecurity leaders are already full with a plethora of matters about which we might lose sleep. Additional matters are not needed. In an environment where diminishing talent is already a factor with which the world is struggling, we do not need this possibility looming as that which discourages talented individuals from considering and eventually entering the profession or encourages seasoned professionals to leave.

KEYWORDS: CISO cyber security enterprise security lawsuits security executive

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    Reflections on 35 years in the trenches

    See More
  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • hacker

    RSA 2018: In the Golden Age of Cyber Crime we have a People Problem

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×
putilich / iStock / Getty Images Plus via Getty Images

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!