Directors on the hook for cyber security, ASIC warns
Repelling attacks is just the start – businesses must demonstrate an ability to respond or the board will be held accountable, the regulator says.
Directors are duty-bound to ensure their company has “adequate” cyber security and the ability to recover from an attack or they could face action by ASIC, the chair of the regulator says.
Joe Longo said cyber readiness meant more than trying to engineer a bulletproof system but extended to building an ability to respond.
“Cyber preparedness is not simply a question of having impregnable systems. That’s not possible,” he said. “Instead, while preparedness must include security, it must also involve resilience, meaning the ability to respond and weather a significant cyber security incident.”
“This can only be built on thorough and comprehensive planning for significant cyber security incidents, and a clearly thought-out risk management strategy.”
Recovery plans on their own were also insufficient without regular testing and never-ending risk reassessment, including within supply chains.
Speaking at the Australian Financial Review Cyber Summit yesterday, Mr Longo said last year’s attacks against Optus and Medibank were a wake-up call but surveys showed most businesses lacked confidence in their organisation’s ability to remain resilient in a “worst-case” cyber event.
One important lesson was that relying on third-party providers always involved risk.
“None of us has control over the security of a third-party provider,” he said. “If we rely solely on the security measures those providers have in place, we leave a wide opening for a data breach if those measures are compromised.”
He said the Latitude Financial breach earlier this year originated from an outside provider and because Latitude was itself a service provider, millions more than its own customers were affected.
Initial findings from an ASIC survey still in progress revealed “that one of the weakest links in cyber preparedness is third-party suppliers, vendors, and managed service providers”.
Supply chain risks were a related issue, with almost one in two respondents saying they did not manage third-party or supply chain risk.
Mr Longo said ASIC had uncovered disconnects in the way various parts of a business handled the digital risks between:
- Boards’ oversight of cyber risk.
- Management reporting of cyber risk to boards.
- Management identification and remediation of cyber risk.
- Cyber risk assessments.
- How cyber risk controls are implemented.
“This disconnect must be addressed,” he said. “Cyber security and resilience are not merely technical matters on the fringes of directors’ duties. ASIC expects directors to ensure their organisation’s risk management framework adequately addresses cyber security risk, and that controls are implemented to protect key assets and enhance cyber resilience.”
“Failing to do so could mean failing to meet your regulatory obligations.”
“Measures taken should be proportionate to the nature, scale and complexity of your organisation – and the criticality and sensitivity of the key assets held. This includes reassessment of cyber security risks on an ongoing basis, based on threat intelligence and vulnerability identification.”
“For all boards, cyber security and cyber resilience have got to be top priorities. “If boards do not give cyber security and cyber resilience sufficient priority, this creates a foreseeable risk of harm to the company and thereby exposes the directors to potential enforcement action by ASIC based on the directors not acting with reasonable care and diligence.”
He said boards and directors also had to consider how they would communicate with customers, regulators, and the market when things went wrong.
“Do they have a clear and comprehensive response and recovery plan? Has it been tested?
“How will the company detect if the system has been broken, or exploited? History shows that even robust defence systems can be circumvented, and resilience demands you be prepared for that possibility.”
He said two points needed to be emphasised: there was a need to act now, and third-party suppliers were a “clear vulnerability”.
“If you’re not evaluating your third-party cyber security risk, you’re deceiving yourself. And recent events show that you will suffer for it.”
“Don’t put yourself in that position.”
Netskope chief information security officer David Fairman has welcomed ASIC’s comments regarding accountability by company directors and boards in relation to cybersecurity fails.
“Last year’s data breaches were supposed to act as wake up calls for Australian businesses, but the amount and scale of cyber incidents that we are continuing to witness shows that it is not yet translating into stronger cybersecurity postures,” said Mr Fairman.
“There is a necessity for boards in Australia to ensure they have the right skill sets at the table in order to manage cyber risk like any other operational risk. This means being in a position to understand the organisation and its digital supply chain’s risk profiles, gaps or blind-spots, define the right priorities and processes to remediate them, and ensure this is being done at pace.
“Education and upskilling isn’t only for employees, and boards need to get serious about it.”