What the Uber Breach Verdict Means for CISOs in the US

Cloud Security

Can already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face personal punishment.

This is a challenging time to be a CISO. The security community has been eagerly following multiple stories regarding Uber in the past few weeks. From the play-by-play of their recent major hack, to last week’s guilty verdict of former Uber security chief Joe Sullivan, CISOs are facing considerable challenges.

The verdict in the Sullivan case found him guilty of obstructing a federal investigation and concealing a felony from the government. According to the New York Times: “Stephanie M. Hinds, the US attorney for the Northern District of California, said in a statement: ‘We will not tolerate concealment of important information from the public by corporate executives more interested in protecting their reputation and that of their employers than in protecting users. Where such conduct violates the federal law, it will be prosecuted.'”

The government is sending a message to CISOs in the US — disclose and potentially lose your job, or cover up and go to jail.

Chen Burshan, Skyhawk Security CEO, authored this post that first appeared in Dark Reading. Click here to continue reading the post.

Blog

As cloud adoption continues to gain traction, so do the risks and challenges of its security. The latest Google Cloud Threat Horizons Report for the first half of 2025, titled:” Evolving Ransomware and Data Theft Risks in the Cloud”, highlights

Cloud BreachAICloud SecurityThreat Detection
Blog

The digital transformation of industries worldwide has been powered by advancements in Information Technology (IT). Over the past two decades, IT has reshaped nearly every facet of modern life, from communication to commerce, especially in developing countries. Within this growth,

Cloud BreachAICloud SecurityThreat Detection
Blog

MITRE ATT&CK® framework provides a comprehensive matrix detailing the tactics and techniques adversaries employ during cyber attacks on cloud environments But as recent attacks illustrate, hackers no longer need to tread the long an winding path described by MITRE ATT&CK®

Cloud BreachAICloud SecurityThreat Detection
Blog

We may have recently been exposed to the largest cyber campaign of all times, in which China managed to completely penetrate the communications infrastructure of its great rival, the United States.In doing so, gained access to huge amounts of invaluable

Cloud Breach
Blog

Re:Invent has come to a close and we had a great week! We kicked off the week with our product announcement. Did you know that most threat actors (70%) are logging into the cloud – they are not “breaking in”.

Cloud BreachCloud SecurityThreat Detection
Blog

Skyhawk Security is proud to announce the expansion of its cloud threat detection and response capabilities with Interactive CDR. This new capability expands the team that can verify if an activity is malicious or not, by going to the alleged

AICloud BreachCloud SecurityThreat Detection
See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.