We asked CSOs and other security execs if the former Pennsylvania CISO deserved to be fired for disclosing an incident at RSA. Here's how five peers view the outcome. Pennsylvania CISO Robert Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. Since then, he has been described as everything from a martyr in the cause of full disclosure to a careless exec who should have known better.Maley said his comments never put the state’s data at risk and he talked because he wanted to promote the success the state has made in the information assurance world. Others, like CSO columnist Ira Winkler, suggested the lesson is that sometimes, it’s better to keep quiet.CSO reached out to other security executives and asked if they would have done what Maley did and if, in the bigger picture, he deserved what he got. The majority view was that his firing was justified. Here are five verbatim responses that explain why people feel this way:Jeffrey Bardin, IT security veteran and CSO blogger From a purely procedural perspective, i.e., assuming he had signed documents requiring permission to speak on such subjects, then yes he should be fired. On the other hand, all too often CISOs are muzzled to the point where their personal and professional integrity is not only under attack, but expected to break. These become ethical questions that then require great thought and soul searching.His disclosure is not seen in the security industry as a big deal; just another in a long line of what we see daily and are not allowed to speak of. Some may see this as a major gaff or breach of conduct. On the other hand, how many other issues is the State of PA hiding (like most organizations) that put the information of their constituency at risk? Where is the organizational rule that says the CIO must deliver code the is free from defects? How many other internet facing applications are full of the same or other holes? How do we get them to take responsibility and accountability for delivering code that is defect free?Overall, I do not believe he should have been fired for this infraction of organizational rules when I see many in the C-Suite grossly violate them regularly without recourse. His firing is just another warning shot to all CISOs that you had best tow the line regardless what you see. Now that he is fired, I would be interested in a full disclosure of all activities at the State of PA. Where there is smoke there is fire. Rafal Los, Chicago-based security specialistUnless you’re a whistleblower you keep your mouth shut and tow the line. If you take a job that has very specific rules you don’t get to whine about it once you break them, no matter how important you are to the community. The fact is, the guy should have kept his mouth shut, or at least not thought of himself as so important to RSA attendees. Ron Baklarz, CISO at AmtrakI have to agree that Maley was not authorized to discuss matters relating to an ongoing investigation. From what I read, the alleged “hack” was really a system anomaly within a specific system (e.g., putting in a 9/9/9999 date which defaulted to today’s date). If this is accurate, Maley’s disclosure didn’t add much if anything to alerting the community to any sort of heinous and common vulnerability that we all should be aware — other than shoddy coding practices. In other words, there really wasn’t any actionable intelligence to be gleaned from his disclosure. Read about related issues in Data Breach Fallout: Do CISOs Need Legal Protection?Bob West, CEO of Echelon One and former CISO at Fifth Third BankIt all depends on what was in his agreement. As a matter of principle, a CISO shouldn’t be fired after a security breach unless there was negligence on the CISO’s part. In the legal community, general counsels don’t get fired after their company is sued and, in a similar vein, they can’t prevent lawsuits from happening. Their responsibility is to create the right legal environment and work with their executive team to minimize the legal risks they face. The decision to accept the risk, mitigate it or transfer risk is a business decision and the general counsel never accepts the risk.Similarly, the CISO can’t prevent security breaches but can do what is commercially reasonable for the corporation. The CISO should be advising the executive team and board about the technology risks they face. As with legal risk, the business should be making the decision about absorbing the risk. Businesses exist to make money, and in order to make money businesses need to take risks. The risks need to be calculated, and that’s where the CISO comes in. The CISO needs to coach the business but it’s the business that needs to make general technology risk decisions.Martin Fisher, manager of the Computer Security Incident Response Team at Delta Airlines Maley deliberately revealed and discussed issues involving his employer at a conference where he was not pre-cleared to speak at – that’s it. He took a risk and lost his job – just like someone on his staff would have.This isn’t about CISOs being muzzled or being held responsible for breaches (what he reported wasn’t even a breach – just some bad acting code) it’s about a senior executive not following the rules.As information security leaders we *must* abide by the rules. And when we choose to violate the rules we *must* accept the consequences.To Maley’s credit he hasn’t (as far as I know) tried to escape responsibility for his decision and I laud him for that. Related content news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe