Operational resilience

March 23, 2026

The Federal Court recently provided guidance on what constitutes adequate cyber security protection for licenced Australian Financial Services (AFS) providers.

For security leaders, risk professionals, and executives, the message is clear: cyber security is no longer just a technical function. It is an ongoing enterprise governance, risk and resilience priority.

Background: ASIC v FIIG Securities

On 13 February 2026, the Court handed down its judgment in ASIC v FIIG Securities Limited, ordering the AFS licensee to pay a $2.5 million penalty for failing to implement adequate cyber security protection.  

While this case sits within financial services, the implications extend far beyond. It establishes a practical definition of “adequate” cyber security that applies across all sectors.  

Key Takeaways for Organisations

The ruling highlights four critical principles for achieving adequate cyber security protection for organisations themselves and their customers:

  • Security controls alone are not sufficient. Implementing recommended cyber security framework controls is only a starting point. Those controls or measures must be regularly maintained to ensure their reliability and effective integration into an effective cyber security risk management system.
  • Adequate cyber security is context-dependent and evolving. What is adequate today may not be adequate tomorrow. Cyber security settings and processes should be regularly reviewed for adequacy against a changing threat environment.
  • Suitable resources are vital to support and maintain the protection process. The Court identified the critical need for skilled people, technology, and financial resources to support and maintain effective risk management and protection outcomes.
  • Benchmark against the ACSC Essential Eight. While not recommending a particular cyber security framework, the observed inadequacies of cyber security measures listed in the case point to the ACSC Essential Eight Maturity Model as providing a practical guide to appropriate measures.

From these principles it follows that as cyber security standards change, the balance of technical resources and skilled personnel is likely to change as organisations seek to improve their cyber security operating models to maintain adequate ongoing protection.

Adequate Cyber Security Protection – more than just controls

The Court identified three essential components of adequate cyber security protection:

  • Cyber security measures or controls and their implementation and ongoing maintenance
  • Risk management systems that analyse control status data for reliable and timely risk management
  • Adequate technological, skilled human and financial resources to support and maintain effective processes and ongoing cyber security protection

While preventing every cyber-attack might be impossible, the Court expects organisations to have adequate cyber security protection. “Adequate” being a context specific term, rather than definitive; implying that cyber security protection standards will vary depending on the nature of cyber security threats faced.

Adequate cyber security protection depends on context

The adequacy of cyber security protection should consider (and regularly review) the risks that are relevant to the specific organisation and its operations:

  • What is the nature of the business?
  • What are the data and assets to be protected?
  • What is the value of those assets held or under the control of the enterprise?
  • What is the magnitude and potential consequence of the cyber security risk?
  • Are there any contractual obligations owed by the organisation to its clients?

Recognising the importance of adequate cyber security resources

Many organisations are currently struggling with the complexity of their cyber security protection. The Court acknowledged that effective protection relies on the interdependence of security controls, risk management systems and adequate resourcing.

In ASIC V FIIG, shortcomings in resourcing contributed directly to inadequate cyber security outcomes.

Adequate cyber security resources

Technical capability and specialist expertise are essential not only for implementing controls and risk management systems, but for maintaining their effectiveness over time. Without access to relevant and up-to-the-minute security data, its interpretation and expert oversight, the cyber security protection process quickly becomes arbitrary and unsuitable as a decision-making or management tool.

Adequate cyber security measures

Rather than a definitive list of required cyber security measures or controls, the Court identified a number of observed shortcomings (see 20-42 in Court Judgement). No direct advice was provided in relation to a particular cyber security framework that might assist in the definition of adequate cyber security measures.

Although, a quick reference to the ACSC Essential Eight framework reveals more than a passing similarity between the measures listed by the Court and the ACSC Essential Eight Maturity Model controls.

Adequate risk management systems

An adequate risk management system should implement, maintain and manage the controls necessary to protect the organisation and its clients.

The Court noted that adequate risk management systems are dependent on:

  • Identification and evaluation of the risks (see Context, above);
    • Identification, establishment, full implementation and maintenance of controls to adequately manage and mitigate those risks;
    • The monitoring of those controls to ensure their ongoing effectiveness; and
    • Ensuring that as part of the overall risk management system, security outcomes are compliant with the Cyber Security Strategies, Policies and governance procedures agreed to by senior management.

Increasingly, as cyber security becomes another operational risk for enterprise to manage, the integration of cyber security into broader enterprise risk and resilience activities, supported by new inter-disciplinary operating models, will be required to better coordinate technical and risk functions.

Integrating cyber security into your corporate risk management architecture

The balance between technology and human resource investment within the cyber security protection process is changing. Disconnected processes and a lack of skilled and knowledgeable cyber security personnel, as evident in this case, can seriously impact cyber security outcomes.

At the same time, organisations are facing increasing demand for timely, reliable and evidence-based security information to support decision-making.

In a rapidly evolving threat environment, an inability to maintain effective cyber security protection can quickly impact operations and overall enterprise resilience.

Rebalancing technology and human resources in a changing risk environment

Effective cyber security risk management brings with it some challenges – threat velocity, visibility, impact and time to response, to name a few. Newer operating models like that in Fig 1.0 (see below) are addressing some of these challenges. 

Effective cyber security protection processes need to be agile and dynamic to meet the sometimes urgency of cyber security risk management in a volatile and dynamic threat environment. As a result, the cyber security protection process increasingly requires the collaboration of multi-skilled participants and information flows – technical, cyber security and risk teams – to quickly and reliably detect, analyse and mitigate emerging security risks before they can impact enterprise operations.

Diagram showing adequate cyber security protection as a multi-disciplinary process integrating security controls, risk management systems and organisational resources

All rights Reserved © Tier-3 Pty Limited 2026

Fig 1.0 Adequate Cyber Security Protection – A Multi-Disciplinary Process

The future of adequate cyber security protection

The judgment reflects a broader trend: cyber security is becoming more complex, while resource constraints and siloed operations remain a persistent challenge.

As a result, organisations are increasingly seeking technology that can supplement human expertise and provide more immediate, data-driven insights.

Continuous measurement of control effectiveness, near real-time risk identification, and automated reporting are becoming essential components of modern cyber security. These capabilities enable organisations to maintain adequate protection even as the threat environment continues to evolve.

Conclusion

The ASIC v FIIG Securities decision makes clear that adequate cyber security is not defined by controls alone. It requires an ongoing, integrated approach that combines effective measures, informed risk management, and the right balance of resources to maintain adequate cyber security protection.

Organisations that fail to adapt and appropriately resource more responsive risk management systems will continue to suffer, not only regulatory consequences, but also broader impacts to their operations and enterprise resilience.

Strengthen your cyber security protection

Maintaining adequate cyber security now requires continuous visibility, control assurance, and risk-informed decision-making.

Huntsman Security supports organisations by enabling that continuous monitoring of control effectiveness for near real-time threat visibility and active cyber security risk management systems.

Speak to an expert today.

References

Cybersecurity enforcement intensifies: lessons from FIIG Securities’ $2.5m compliance penalty – Lexology – practical know-how

https://www.asic.gov.au/about-asic/news-centre/find-a-media-release/2026-releases/26-021mr-asic-action-sees-fiig-securities-ordered-to-pay-2-5-million-over-cyber-security-failures

BLOG POSTS

Related Cybersecurity Content

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.