The recent cyberattack on Qantas is not just a headline – it reflects a truth many organisations are reluctant to face: We are not as in control as we think we are. Despite decades of investment in cybersecurity, a single phone call to a third-party helpdesk was enough to compromise a national airline.

This incident underscores a pressing need for boards and executive teams to revisit foundational questions: Do we truly understand our digital exposure? Are we managing cyber risk as a business risk, or as a technical silo? And crucially, are we prepared for what comes next?

Key Lessons here:

  • Third-party risk is first-party risk. The breach originated not within Qantas’s core systems, but through a vendor. Supply chain security must be treated as integral, not peripheral.
  • Cybersecurity is a human issue. The attack succeeded through deception, not code. This highlights the need for continuous education, not just technical defences.

Questions for Management: A Reflective Framework

Too often, boards ask: Is the organisation secure? The better question is: Does the organisation understand where it’s exposed, and is it honest about it?

Let’s reframe the conversation. Here are key questions that matter now:

  • Asset Awareness: Do we know where our critical data reside? Not just in our systems, but in the hands of vendors, contractors, and forgotten cloud instances.
  • Risk relevance: Are we tracking the risks that are relevant to us or just the ones that are easy to measure? How do we ensure our risk register reflects emerging threats?
  • Risk appetite: Is our cyber risk appetite statement a living guide, or a compliance artefact?
  • Financial Framing: Can we express cyber risk in financial terms (not just in firewalls)? What would a breach cost us – not just in fines, but in trust, operations, and recovery?
  • Control Weaknesses: Where are we most vulnerable, and what are we doing to reduce those weaknesses systematically – beyond PowerPoint?
  • Effectiveness Metrics: Do we have metrics that tell us what’s really happening – not just what we hope is happening? Can we provide both lead (e.g. phishing simulation failure rates) and lagging (e.g. incident response times) indicators of control effectiveness?
  • Third-party Oversight: How are we managing the risk we’ve outsourced? And are we sure we haven’t outsourced responsibility along with it? Are we relying on paper-based assurances, or evidence-based audits?
  • Insurance Adequacy: Is our cyber insurance coverage fit for purpose in today’s landscape?

These are not tick-box questions. They require honest, sometimes uncomfortable, reflection.

AI in Cybersecurity: Opportunity and Risk

AI is increasingly embedded in security programs, offering real benefits:

  • AI can analyse vast datasets to detect anomalies faster than human analysts.
  • Machine learning models can anticipate attack patterns based on historical data.
  • AI can flag unusual user behaviour, helping detect insider threats or compromised accounts.
  • AI can triage alerts and even initiate containment actions, reducing response times.

However, AI also introduces new risks:

  • AI systems themselves can be targeted, manipulated, or used to generate more convincing phishing attacks.
  • Over-reliance on AI can mask underlying weaknesses in governance, process, and culture.
  • AI models can be black boxes, making it harder to explain or audit decisions, especially in regulated environments.

The danger isn’t AI itself – it’s the mindset that comes with it. The belief that we can automate our way out of structural weaknesses. That we can plug in a tool and call it transformation. AI is not a bandage for broken governance. It’s not a substitute for culture. And it’s certainly not a reason to stop asking hard questions.

AI should be seen as a force multiplier. It can enhance but not replace the basics of foundational security hygiene: asset management, access control, incident response, and a culture of security.

From Crisis to Capability: What Now?

Cyber resilience is not a destination, but a discipline. It requires:

  • Leadership Engagement: Cybersecurity must be owned at the top. Boards should demand clarity, not comfort.
  • Scenario Planning: Assume breach. Test your response. Simulate the worst day, not the best case.
  • Transparency and Trust: Communicate openly with customers and regulators. Trust is easier to lose than to regain.
  • Continuous Learning: Treat every incident – yours or others’- as a learning opportunity. What would we do differently?

Organisations that manage cyber risk well tend to do a few things differently:

  • They treat cyber as a business risk, not an IT problem.
  • They invest in understanding, not just in tools.
  • They measure what matters, even when it’s uncomfortable.
  • They simulate failure, not just success.
  • They talk about risk in the language of the business.
  • They build resilience, not just defences.

This isn’t easy. It requires humility, curiosity, and a willingness to challenge the status quo.

But it’s the only way forward.

Cybersecurity is not just an ICT issue. It is a business risk, a leadership challenge, and a societal concern. One that requires constant reflection, relentless questioning, and the courage to act on what we find.

It is also a call to action – to lead with clarity, to invest in resilience, and to treat cybersecurity not as a cost, but as a core enabler of trust in the digital age.