SEC Issues Wells Notice to SolarWinds, Including CISO: Implications for Information Security and Cybersecurity Governance
Last week, the SEC sent out a Wells Notice to SolarWinds former employees, their CFO, and their CISO related to the breach in 2020. Here is a link to a great summary of the Solarwinds attack and its impact. The CISO being on the list is a first and an absolute game changer. Wells Notices are a really big deal, here is a quick summary:
A "Wells Notice" is a letter sent by a securities regulator to a prospective respondent, notifying him of the substance of charges that the regulator intends to bring against the respondent, and affording the respondent with the opportunity to submit a written statement to the ultimate decision maker. - Cornell Law Legal Information Institute
A Wells Notice happens after the SEC has finished their review to an event, and after they have typically found legal and/or regulatory issues and infractions have been found either of the company or, in this case, the individuals on the notice. Usually, Wells Notices are used for embezzlement and fraud (investor, wire, fraud, etc), but to this point, a CISO has never had a Wells Notice. This is a game changer for Information Security Officers.
We don't have the details around the facts the SEC found in the Wells Notice, just the fact that they were served. So at this point, we can't jump into the details around why and how the notice happened, but it does open some really challenging items to review.
First, let's jump in if you are a publicly traded company (if you are a community bank, don't leave me yet, more to come below). This is a precedent case, something that you want to watch. If you are CISO, this may open the door to more personal risk for you, and it would be wise to think about the implications. If you are a SEC traded company, it opens up a couple of pretty significant items, we haven't seen teeth in regulations like this for information security and cybersecurity, and it is clear that there is a regulatory shift and expansion
For my community banking network, this is yet again another example of regulations in information security and cybersecurity expanding, and these questions above are items that should be reviewed by your senior leadership team.
It opens questions like,
领英推荐
What happens when Information Security Officers are held accountable by the regulators for overseeing the soundness of the bank's information security program?
If you are the Information Security Officer at the bank this moves the needle on you being held accountable personally for your role as the ISO. What would you be more adamant about implementing if you were held personally responsible? Do your board and senior management team know these items? If not, this could be a great time to start a meaningful, transparent conversation.
The recent Third Party Risk Management Guidance from the Federal Reserve, FDIC, and OCC, along with the cybersecurity standards issued by the OCC, highlight the increasing regulatory expectations in information security and cybersecurity. I will be having articles on both of these in the coming weeks; make sure to hit subscribe, and as always, let me know your thoughts on the content and areas that you would like for me to focus on in the comments.
Humanist & Technologist
1 年The fact that banks were allowed to use solar winds without being required to use their login security feature (something I had used for years and the retail space and was never compromised, even with running the vulnerable version pre-patch) was one of the frustrations that some of us IT folks with a security focus complained about...
Fidelity National Information Services-Retired
1 年Excellent!!!