Cyber risk: Directors’ duties and implications for M&A
read
On 18 September 2023, ASIC Chair Joe Longo addressed the Australian Financial Review Cyber Summit on the topic of cyber preparedness.
His message was stark and should prompt immediate action from directors on company boards, both generally in evaluating their third-party supplier cyber risk and in how they approach mergers & acquisitions (M&A).
In this article, Luke Dawson from HopgoodGanim’s M&A practice and Briar Francis from our Intellectual Property, Technology and Cyber Security team discuss the key points raised and what you should know to reduce the risk and prepare for cyber attacks.
Two key headline points were raised, namely:
If every system is vulnerable, how can companies defend against cyber-attacks? The unfortunate reality is that it seems that while defence should of course be a key focus, companies should also prepare for the inevitable and have a response plan in place to weather a significant cyber security incident.
ASIC recommend that companies should ensure they have a thorough and comprehensive plan in place for significant cyber security incidents and a clearly thought-out risk management strategy.
For listed companies that are familiar with regulated M&A, structuring that plan may result in companies creating a manual similar to that used in a takeover defence. The manual would look to have detailed contingencies in place for conceivable scenarios, an identified response team, a template holding-statement announcement in respect of a cyber-attack, and the telephone cascade that is immediately initiated upon the occurrence of an incident.
As to the second matter raised by ASIC, ASIC make the point that none of us have control over the security of a third-party provider and that their initial findings from a survey conducted make it clear that one of the weakest links in cyber preparedness is third-party suppliers, vendors and managed services providers. An evaluation of third-party supplier cyber risk should be another key area of focus for companies.
ASIC go on to note that cyber security and resilience are not merely technical matters on the fringes of directors’ duties, but that directors should specifically ensure their organisation’s risk management framework adequately addresses cyber security risk and that controls are implemented to protect key assets and enhance cyber resilience. ASIC explain that failing to do so could mean not meeting regulatory obligations and that if cyber security is not given sufficient priority, directors may be exposed to potential enforcement action by ASIC based on the directors not acting with with reasonable care and diligence (refer section 180(1) of the Corporations Act 2001 (Cth)).
It is clear that you cannot rely solely on the security measures put in place by your third-party suppliers.
ASIC provide three non-exhaustive ideas that companies can adopt to protect against cyber vulnerability:
Never set and forget
Supply chain and vendor risk is not a passive matter and an active approach to engaging with this risk early and often will assist companies and directors in mitigating risk.
We would add that the data security practices adopted by a third-party vendor at the time of entering into a services agreement are unlikely to be sufficient five years into the engagement. Suppliers should be obligated to regularly reassess and improve their security practices and clearly communicate any changes with their customers.
Planning and testing
ASIC ask a series of questions which boards and companies would be wise to consider and engage with:
As noted above, putting in place a tailored ‘cyber defence manual’ (including a comprehensive and up-to-date data breach response plan) would assist a board and a company in addressing a fair number of these questions. Similarly, having regular penetration testing of systems and infrastructure can assist in identifying weaknesses that may be exploited.
It is important to note that cyber security transcends malicious code and hacks occurring through the internet or networks and that staff training is also provided so that employees are vigilant against physical cyber attacks perpetrated through social-engineering (i.e., granting access to secure premises to the person wearing a high-vis vest and carrying a clipboard).
You can’t protect what you aren’t aware of
Almost half of the respondents to ASIC’s cyber pulse survey indicated that they don’t identify critical information and business critical systems. As ASIC point out, if these systems and information are not identified, then they cannot be protected (e.g., by ensuring ‘need to know’ access only).
Cyber risk should also be contemplated in the process of M&A. A cyber incident can theoretically impact any stage of the acquisition process, including:
How then, should companies identify cyber risk in their due diligence processes? Well, there is no one size fits all approach, however consideration may be given to:
- any prior cyber incidents (data leaks, ransomware incidents or similar) or knowledge of matters that may lead to a cyber incident;
- the audit processes that have previously been undertaken and are planned;
- the third-party supply chain risk that exists;
- whether there are procedures in place to mitigate against an incident and understanding whether clearly defined roles exist in that mitigation strategy.
While not the subject of this article, it is important also to keep in mind that effective data security practices anticipate far more than securing data against malicious cyber attacks, and there are many other ways personal information or commercially sensitive data can be compromised. It is equally important to ensure measures are in place to address inadvertent disclosure or loss of data, which may also constitute a notifiable data breach under both the Australian and overseas privacy and data protection regimes.
For more information and to ensure your company is protected, reach out to HopgoodGanim’s Intellectual Property, Technology and Cyber Security team and M&A team.