Cybersecurity whistleblowers: Get ready for more

It is not a comfortable topic – virtually all cases involving a cybersecurity whistleblower have ended with a confidential settlement. But experts, and lawyers, say that in an increasingly connected world, those cases are bound to increase


It is not a public problem yet. But according to multiple experts, it will be.

“It” is the cybersecurity whistleblower – an employee who sees a flaw, or flaws, in his or her company’s network security, brings the problem to management but gets ignored or punished – marginalized, harassed, demoted or even fired.

And then the worker either goes public or files a complaint with a federal regulatory agency like the Securities and Exchange Commission (SEC).

Such a scenario is unlikely to end well – almost certainly for the company (if the complaint is credible) and perhaps even for the whistleblower, notwithstanding laws meant to protect them.

The company could face fines and other regulatory actions. The employee, who in some cases could be rewarded (the SEC offers 10 percent to 30 percent of a settlement of more than $1 million to “qualifying” whistleblowers), still might find it damaging to a career.

[ ALSO ON CSO: Whistleblowers at risk when using US government websites ]

“Think about it. If you were someone classified as a whistleblower, it would label you unemployable,” said one expert who declined to speak for attribution.

Another expert, who also declined to speak for attribution, said when he refused to certify that his previous employer was meeting a certain security standard, “I got warned, and eventually resigned. It became a hostile work environment.”

He has never spoken about it to regulators or other outside authorities either.

Eddie Schwartz, international vice president of ISACA and president of WhiteOps, said he knows of a case where a nation-state hack occurred and an employee reported it to his superiors.

“He was told to mind his business and that the organization was dealing with it. It wasn’t, and when he reported it to authorities, he was essentially fired for it,” Schwartz said.


Eddie Schwartz, international vice president of ISACA, president of WhiteOps

So the predicted increase in cybersecurity whistleblower cases is somewhat speculative at the moment, in part due to secrecy. There are no public cases involving them on record so far, even though most businesses have had an online presence for two decades or even longer.

They do exist, according to Debra Katz, a founding partner at Katz, Marshall & Banks. She said her firm has represented about a dozen such whistleblowers, but those cases were, “settled in the pre-litigation stage and contain robust confidentiality provisions.” In other words, they are not public.

A second reason for a lack of clarity is that it remains a relatively new legal field. “All federal agencies – not just the SEC – are playing catch-up to align their policies with the seriousness of cybersecurity threats,” Katz said.


Debra Katz, founding partner, Katz, Marshall & Banks

That means there is not much legal history, precedent or even laws that specifically addresses cybersecurity whistleblowers.

While there are nearly two dozen laws in various states that provide protection for whistleblowers in areas ranging from asbestos to drinking water, solid waste, railroads, motor vehicles, shipping containers, pipelines aviation, consumer products, hazardous waste, food, drugs and more, there is nothing on the books that provides specific protection for those involved with cybersecurity.

Still, attorneys like Katz, who specialize in whistleblower cases, say top management in organizations may need to play catch-up as well, since such cases could lead to damaging breaches or an investigation by a regulatory agency – or both.

And while legal protections may not be explicit for cybersecurity whistleblowers, they exist by implication, experts say. Lance Hayden, managing director at the Berkeley Research Group and a CSO contributor, is one of several who have cited a settlement last September between the SEC and R.T. Jones Capital Equities Management over charges that the firm’s violation of the “safeguards rule” led to a breach that compromised the information of about 100,000 people.

While the firm did not have to admit to the charges, it agreed to a censure by the SEC and to pay a $75,000 fine.

There was no documented evidence of whistleblower involvement in the case, but Hayden wrote that it became, “a sort of catalyst,” for the SEC to focus on cybersecurity.

He quoted SEC Commissioner Kara Stein saying after the R.T. Jones settlement that the agency intends “ play a much more active role in trying to help companies better protect themselves against an increasing number of cyber security issues …”

Dallas Hammer, an attorney with Zuckerman Law, writing for the National Law Review, said the R.T. Jones case indicates that, “cybersecurity issues have become a key enforcement priority for the SEC,” which means that, “in turn, whistleblower tips that touch on cybersecurity may receive additional scrutiny.”

1 2 Page 1
Page 1 of 2
The 10 most powerful companies in enterprise networking 2022