Knowledge hub

Rethinking risk | Cyber resilience as a boardroom priority

Back to insights

By Capital Partners Lifestyle

For many boards, cyber risk still sits on the IT agenda. It’s reviewed periodically, ticked off in compliance updates, and revisited when a breach makes headlines.

But the scale and nature of today’s threats demand more. Cybercrime has become relentless, targeted, and high-consequence. In 2024-25, the Australian Signals Directorate received more than 94,000 cybercrime reports (roughly one every six minutes). Attacks are no longer confined to data theft. They’re disrupting operations, exploiting critical infrastructure, and shaking investor confidence (ASD, 2025).

Ransomware remains one of the most damaging threats. The financial impact on medium-sized organisations now exceeds $97,000 per incident on average, and that doesn’t account for reputational fallout, legal exposure, or downtime. Despite this, less than 70% of large Australian businesses hold standalone cyber insurance, and even fewer SMEs have cover in place (Insurance Council of Australia, 2022).

For boards and executive teams, cyber resilience must now be treated as a core pillar of governance alongside financial, legal, and operational risk.

Why insurance must be part of the risk conversation

For too long, cyber insurance has been viewed as an optional layer of protection, considered after investing in firewalls and employee training. But as attacks become more sophisticated and their consequences more widespread, insurance is becoming a critical part of business risk strategy.

Today’s incidents extend well beyond IT. They trigger regulatory investigations, class actions, public scrutiny, and operational shutdowns. In 2024-25 alone, the Australian Signals Directorate responded to 127 cyber security incidents affecting critical infrastructure sectors, with many incidents also impacting supply chains and sensitive financial data (ASD, 2025).

While cyber insurance policies are a vital recovery strategy, they also contribute to resilience. Many include:

  • Forensic investigation and data restoration
  • Legal and regulatory support
  • Customer notification and support services
  • Negotiation and indemnity in the event of ransom demands

Yet, despite these benefits, coverage remains low. Just 20% of SMEs and between 35-70% of larger businesses in Australia currently hold standalone cyber insurance (Insurance Council of Australia, 2022). That leaves a significant number of organisations exposed.

If your systems go dark, how long can you wait?

Ransomware has evolved. Once encrypting files and demanding payment, it now brings entire systems to a standstill. In 2024-25, over 80% of all ransomware incidents reported to the ACSC involved data theft or encryption, with many impacting core business operations, including finance, logistics, and customer service (ASD, 2025).

That makes cyber resilience a business continuity issue.

Modern continuity plans should include:

  • Defined recovery time objectives (RTOs) and recovery point objectives (RPOs) for critical systems
  • Offline, encrypted backups with rapid failover capability
  • Cyber-specific crisis communication protocols

Yet many plans go untested or overlook cyber risks entirely. Business email compromise alone cost Australian organisations over $77 million last year, often while key teams were locked out or unaware of the breach (ASD, 2025).

Cyber risk must sit in the enterprise risk register alongside supply chain and regulatory risk. It’s a business issue with real-world consequences.

Where your financial data lives and who can touch it

Cybercriminals aren’t chasing headlines, they’re chasing high value data. In most organisations, that means financial information.

Payment systems, supplier accounts, payroll platforms, investment details, and customer billing data are all high-value targets. Business email compromise (BEC) was the most costly cybercrime for Australian organisations in 2024-25, with an average reported loss of over $39,000 per incident and a total loss exceeding $77 million (ASD, 2025). Many of these cases began with compromised credentials or socially engineered invoice redirection scams.

Beyond antivirus software and strong passwords, protecting financial data demands:

  • Least-privilege access: Limit system permissions to only what’s necessary for each role.
  • Regular audits: Review who has access to financial platforms, especially during role changes or restructures.
  • End-to-end encryption: Encrypt financial data both at rest and in transit to reduce exposure if a breach occurs.
  • Ongoing education: Phishing, social engineering, and invoice redirection scams are becoming harder to spot. Training finance and executive teams regularly is critical.

A recent ACSC threat report confirmed that 80% of cybercrime reports to ReportCyber in 2024-25 involved compromised credentials (ASD, 2025). Many of these incidents could have been avoided with better internal controls and awareness.

Resilience starts with visibility. Know where your financial data lives, who has access, and how it’s protected, because a single exposed credential can become a company-wide crisis.

Auditing the maturity of your cyber security

Beyond auditing access, the next step towards improving your cyber security is having a comprehensive understanding of your status today. Conducting a maturity audit will give you the clarity on next steps and how to inevitably broach the subject with the wider board.

The National Institute of Standards and Technology (NIST) has developed a global Cybersecurity Framework (CSF) that helps you to identify your maturity level and work to a common language internally:

  • Tier 1: Partial

Your cybersecurity risk management is reactive and adhoc; there are not formal processes or guardrails in place.

  • Tier 2: Risk-informed

You have some policies and procedures in place however they may be outdated and not fully integrated across the organisation.

  • Tier 3: Repeatable

At this tier, your cybersecurity is more of a priority; there are defined policies, implemented tools, monitoring schedules, and regular reporting.

  • Tier 4: Adaptable

At the highest maturity level, your cybersecurity is well integrated into the organisation, you are conducting regular checks and improvements, and the organisation responds quickly to threats.

Bring cyber to the boardroom table

Cyber security now shapes reputation, influences investor confidence, and can determine the success of major strategic decisions. Yet too often, it remains absent from executive agendas, treated as a siloed IT issue rather than an enterprise-wide concern.

That gap leaves organisations vulnerable.

From disrupted operations and leaked financials to stalled acquisitions and shaken customer trust, the consequences of cyber incidents now touch every corner of the business. And with regulators placing greater accountability on directors, the stakes are only getting higher.

Here’s why it belongs on the agenda:

  • Valuation and trust: Breaches can erode brand equity and delay high-value deals
  • Regulatory scrutiny: Executive teams must show clear oversight and preparedness
  • Cross-functional exposure: Digital threats now impact everything from payroll to procurement

Boards that engage early—and have a maturity level goal—can often help their organisations stay secure, resilient, and ready to respond.

Cyber risk is now a director’s responsibility

Cyber risk is a board-level vulnerability with material consequences. Yet many organisations remain underinsured, underprepared, and unclear on where accountability sits.

Threats are escalating, recovery costs are climbing, and directors are now expected to demonstrate oversight.

Boards have a clear opportunity to shift from reactive defence to strategic resilience. That means embedding cyber risk into enterprise risk frameworks, ensuring insurance is fit for purpose, and regularly testing response plans.

The stakes are high. So is the value of getting it right.

 

References

Australian Cyber Security Centre (ACSC) 2025, Annual Cyber Threat Report 2024-25, Australian Signals Directorate, Canberra. https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/annual-cyber-threat-report-2024-2025

Insurance Council of Australia (ICA) 2022, Cyber Insurance: Protecting our way of life in a digital world, Insurance Council of Australia, Sydney. https://insurancecouncil.com.au/wp-content/uploads/2022/03/Cyber-Insurance_March2022-final.pdf

DNA Cyber Security. (n.d.). 2025, NIST Cybersecurity Framework: Guide for Australian Businesses. https://dnacyber.com.au/nist-cybersecurity-framework-a-strategic-guide-for-australian-businesses/

The information provided on this site is of a general nature only and may not be relevant to your particular circumstances. The circumstances of each investor are different and you should seek advice from a financial planner who can consider if these strategies and products are right for you.

Ideas & insights

Knowledge Hub

How to protect your financial identity during cyber awareness month

Lifestyle • Article

Private credit unveiled | Risks, rewards, and realities for investors

Podcast | The Purposeful Investor • podcast

From umpiring to wealth advising | Meet Rob McCaw

Podcast | The Purposeful Investor • podcast

Super tax backflip | A timely reminder to stay the course

Capital Partners News • Article