Clear Picture Logo

Latest News

Directors on the hook for cyber security, ASIC warns

Repelling attacks is just the start – businesses must demonstrate an ability to respond or the board will be held accountable, the regulator says.

.

Directors are duty-bound to ensure their company has “adequate” cyber security and the ability to recover from an attack or they could face action by ASIC, the chair of the regulator says.

Joe Longo said cyber readiness meant more than trying to engineer a bulletproof system but extended to building an ability to respond.

 

“Cyber preparedness is not simply a question of having impregnable systems. That’s not possible,” he said. “Instead, while preparedness must include security, it must also involve resilience, meaning the ability to respond and weather a significant cyber security incident.”

 

“This can only be built on thorough and comprehensive planning for significant cyber security incidents, and a clearly thought-out risk management strategy.”

 

Recovery plans on their own were also insufficient without regular testing and never-ending risk reassessment, including within supply chains.

Speaking at the Australian Financial Review Cyber Summit yesterday, Mr Longo said last year’s attacks against Optus and Medibank were a wake-up call but surveys showed most businesses lacked confidence in their organisation’s ability to remain resilient in a “worst-case” cyber event.

One important lesson was that relying on third-party providers always involved risk.

“None of us has control over the security of a third-party provider,” he said. “If we rely solely on the security measures those providers have in place, we leave a wide opening for a data breach if those measures are compromised.”

He said the Latitude Financial breach earlier this year originated from an outside provider and because Latitude was itself a service provider, millions more than its own customers were affected.

Initial findings from an ASIC survey still in progress revealed “that one of the weakest links in cyber preparedness is third-party suppliers, vendors, and managed service providers”.

Supply chain risks were a related issue, with almost one in two respondents saying they did not manage third-party or supply chain risk.

Mr Longo said ASIC had uncovered disconnects in the way various parts of a business handled the digital risks between:

  • Boards’ oversight of cyber risk.
  • Management reporting of cyber risk to boards.
  • Management identification and remediation of cyber risk.
  • Cyber risk assessments.
  • How cyber risk controls are implemented.

“This disconnect must be addressed,” he said. “Cyber security and resilience are not merely technical matters on the fringes of directors’ duties. ASIC expects directors to ensure their organisation’s risk management framework adequately addresses cyber security risk, and that controls are implemented to protect key assets and enhance cyber resilience.”
“Failing to do so could mean failing to meet your regulatory obligations.”

“Measures taken should be proportionate to the nature, scale and complexity of your organisation – and the criticality and sensitivity of the key assets held. This includes reassessment of cyber security risks on an ongoing basis, based on threat intelligence and vulnerability identification.”

“For all boards, cyber security and cyber resilience have got to be top priorities. “If boards do not give cyber security and cyber resilience sufficient priority, this creates a foreseeable risk of harm to the company and thereby exposes the directors to potential enforcement action by ASIC based on the directors not acting with reasonable care and diligence.”

He said boards and directors also had to consider how they would communicate with customers, regulators, and the market when things went wrong.

“Do they have a clear and comprehensive response and recovery plan? Has it been tested?

“How will the company detect if the system has been broken, or exploited? History shows that even robust defence systems can be circumvented, and resilience demands you be prepared for that possibility.”

He said two points needed to be emphasised: there was a need to act now, and third-party suppliers were a “clear vulnerability”.

“If you’re not evaluating your third-party cyber security risk, you’re deceiving yourself. And recent events show that you will suffer for it.”

“Don’t put yourself in that position.”

 

 

 

Philip King
19 September 2023
accountantsdaily.com.au

 

Hot Issues

Craig Byron

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce efficitur ligula id justo blandit, sit amet accumsan magna scelerisque. Phasellus tincidunt ipsum nec semper sagittis. Suspendisse suscipit, orci sed gravida dapibus, elit est porta ligula, vel convallis metus urna et ante. Pellentesque aliquam erat sodales sem blandit, ac facilisis magna mattis. Aliquam id lorem eu mauris bibendum facilisis in sit amet leo.

Morbi non ante vitae velit vehicula vehicula vitae euismod ex. Ut pretium rhoncus lacus in tincidunt. Suspendisse vulputate, diam eget viverra feugiat, magna velit scelerisque velit, vel posuere eros sem ut felis. Sed pellentesque justo in eros iaculis, et consequat nibh sollicitudin. Ut facilisis sit amet turpis sed cursus. Sed tincidunt neque arcu, a rutrum lectus elementum quis.

Vivamus nisi lectus, malesuada vel maximus a, lobortis in justo. Donec turpis diam, consectetur eu justo ut, accumsan malesuada nisl.

Service 1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Mauris eget pulvinar velit. Pellentesque condimentum felis enim, vitae mollis felis feugiat sed. Fusce quis eros rutrum, blandit sem ut, pharetra felis. Aenean pulvinar et risus et rhoncus. Maecenas feugiat consectetur risus, eu lobortis erat viverra vitae. Nam tempor tellus bibendum, tempus elit a, laoreet metus.

Sed consectetur quam quis purus lobortis, sed rhoncus enim finibus. Sed fringilla eu lectus sit amet pretium. Ut tempus aliquam iaculis. Nulla enim elit, pellentesque ut maximus a, efficitur eu risus. Praesent finibus interdum finibus. Pellentesque et maximus dui. Maecenas consequat suscipit eleifend. Curabitur placerat quam nulla, et fringilla nisl consectetur eu. Proin posuere, nisl in viverra egestas, leo urna consequat risus, at euismod orci est quis sem. Praesent convallis viverra elit eu lacinia.

  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Nulla commodo ex eu blandit maximus.
  • Cras vulputate libero vel felis mattis, a ultricies arcu pellentesque.
  • Etiam suscipit turpis a mauris fermentum, quis accumsan est dapibus.
Contact Us

Tax Diary

General Calculators

 

Accounting Videos

Secure File Transfer

Secure File Transfer is a facility that allows the safe and secure exchange of confidential files or documents between you and us.

Email is very convenient in our business world, there is no doubting that. However email messages and attachments can be intercepted by third parties, putting your privacy and identity at risk if used to send confidential files or documents. Secure File Transfer eliminates this risk.

Login to Secure File Transfer, or contact us if you require a username and password.