Finally one of the most corrupted leader of Splunk leaves the company. Bill Hustad was given the partner organization two years ago and has not driven anything except promoting and supporting a channel team manipulating partner deals resulting in one of the biggest fraud in the channel history. Splunk should clean the house after he leaves. Blanca Galletero in EMEA should follow as many other corrupted channel leaders
2 replies (most recent on top)
He is now at Okta and working with Susan St. Ledger who was President of sales and customer success at Splunk.
YES SPLUNK IS KNOWN FOR CORRUPT PRACTICES ABOUT EVERYTHING. READ BELOW:
VA Whistleblower Retaliation A Problem At Highest Levels Report Suggests
VA whistleblower retaliation has been a problem even at the highest levels of the agency according to a recent investigation linked to technology contract procedures.
According to FedScoop, Department of Veterans Affairs (VA) Office of Accountability and Whistleblower Protection (OAWP) completed an investigation and issued a report into alleged retaliation implicating the conduct of at least one of the agency’s former Information Technology leaders.
FedScoop received an exclusive on the OAWP report that reportedly confirmed allegations of retaliation against a whistleblower by Paul Cunningham, the former VA chief information security officer (CISO).
His subordinate, IT leader Joseph Stenaka, made protected disclosures alleging wrongdoing by Cunningham in contracting procedures for software services that apparently implicated contracting practices by the CISO.
The FedScoop story indicated Stenaka was the victim of retaliation “after he raised concerns about contract negotiations between former CISO Paul Cunningham and software company Splunk.”
Stenaka was reportedly retaliated against twice by his boss as a result of his whistleblower communications. Cunningham gave Stenaka low performance ratings and removed him from his post as executive director for information security operations within VA OIT. It appears he was demoted to a similar role within Veterans Benefits Administration.
Not only did Stenaka get a low performance rating he did not deserve, but his supervisor removed him from his post, a personnel action that could have a career-ending effect.
Fortunately, after the OAWP report was issued, it appears Stenaka was reassigned. He is presently listed by VA as the Executive Director, Information Security Operations/Deputy Chief Information Security Officer and Chief Privacy Officer with the Department of Veterans Affairs.
Stenaka also alleged retaliation against another senior VA official at the time. The other allegations were not addressed in the report given to FedScoop.
It’s been quite a few years since VA initiated policies to eliminate whistleblower retaliation problems. Wasn’t the VA Office of Accountability and Whistleblower Protection (OAWP) supposed to fix this years ago?
The reporting suggests OAWP may still have some problems in keeping reporting confidential.
Curious in this situation would be asking what steps OAWP is taking to keep whistleblower reports confidential when the agency official responsible for cyber security is the same official being complained of likely using the same cyber systems.
Is it possible in practice to keep such communications confidential from the agency’s IT leadership?