Operational resilience

March 11, 2026

At the ASIC Annual Forum in November the ASIO Director General Mike Burgess made something crystal clear. The threat of high impact cyber sabotage in Australia is no longer a distant or hypothetical scenario. State backed adversaries are actively probing Australia’s critical infrastructure, looking for opportunities to disrupt power, poison water supplies, interfere with telecommunications and destabilise financial systems. These risks are not theoretical. They are already unfolding around the world, and Australia has become a prime target.

The implications of this growing threat extend far beyond government agencies and essential service providers. Private sector organisations are now firmly in the firing line too. Concerningly, he noted, was that parts of the economy were vulnerable to attack, despite many companies believing that they have strong cybersecurity programs in place. Recent events across Australia and the United Kingdom have shown that even well-resourced enterprises can be blindsided by sophisticated attackers who quietly exploit unseen vulnerabilities and control weaknesses.

In this environment, relying on periodic checks or traditional security indicators simply is not enough. If organisations cannot see the full extent of their exposure, they cannot hope to defend themselves against it.

A Shifting Threat Landscape

Recent high-profile attacks in the UK demonstrate just how quickly a cyber incident can escalate into a national problem. Disruptions at major retailers and manufacturers triggered operational shutdowns, supplier impacts and financial losses running into the billions. In one case, the damage was so severe that it contributed to a measurable drop in the UK’s quarterly GDP.

This is the new reality. Adversaries are no longer limiting their attention to public sector infrastructure. They are targeting private enterprises, supply chains and commercial operations to create maximum disruption. The goal is not always data theft. Increasingly, it is sabotage, destabilisation and economic advantage.

ASIO’s assessment of Australia’s cyber fragility mirrors the concerns raised by UK authorities. Both warn of a widening gap between the escalating sophistication of cyber threats and the current ability of organisations to defend against them. In both markets, the underlying message is the same. The threat is well understood, the vulnerabilities are visible and the risks are manageable. But only if leaders take action now.

Complexity is not an excuse

One of Burgess’s most powerful observations was simple. Complexity is not an excuse. If risks are foreseeable and vulnerabilities are knowable, then failing to act is a strategic oversight.

This message should resonate across boardrooms. Because many organisations still treat cyber risk management as a compliance requirement, rather than a routine component of operational resilience. They rely on historic assurances, legacy reports or gut feel assessment. They assume that silence means safety. Unfortunately, however, silence is often the gap where adversaries quietly operate to exploit weaknesses.

To build true cyber resilience, organisations need three pillars of understanding.

  1. Clear visibility of what is valuable. This includes data, intellectual property, operational systems and supply chain dependencies.
  2. Insight into what is vulnerable. Not once a year, but continuously. Threats evolve quickly, and so do internal weaknesses.
  3. Reliable mitigation and oversight. This requires more than basic controls. It demands ongoing intelligence, data driven validation and measurable risk reporting.

Without these elements, leaders cannot form an accurate picture of their threat exposure. And without visibility, there is no resilience.

Operational Resilience depends on timely intelligence

The modern enterprise is deeply interconnected. A single attack can cascade through suppliers, partners and critical functions within hours. The attacks seen in the UK proved just how widespread and long lasting the impact of a single breach can be. Production halted. Employees were sent home. Supply chains faltered. Costs climbed into the billions.

What many organisations fail to recognise is that the true cost of cyber sabotage is rarely isolated or immediate. Disruption compounds across operations, customers and supply networks. Recovery takes time. Reputation suffers. Regulators take interest.

Most importantly, threats often sit inside networks long before activation. Attackers study internal systems, map vulnerabilities and wait for the moment when their actions will cause maximum disruption.

Resilience requires more than defence. It requires intelligence. It requires the ability to detect, measure and respond to changes in threat exposure with speed and accuracy.

Building real cyber resilience

Effective cyber risk management is not a one-off initiative. It is an ongoing process that adapts as threats evolve. The organisations that withstand attacks are those that have built systems and practices founded on timely, data driven insights and lessons learned.

To strengthen resilience, organisations must:

  • Invest in robust and adaptable cybersecurity controls
  • Improve visibility across all stages of potential attack activity
  • Implement intelligence driven monitoring and measurement
  • Provide accurate, actionable reporting to boards and stakeholders
  • Maintain the agility to respond when threat exposure changes

This approach ensures organisations are not blindsided by vulnerabilities they did not know existed.

The path forward

Australia is facing a critical moment. Cyber sabotage is a real and dynamic risk. The vulnerabilities are known. The consequences are severe. Adversaries are currently exploiting its complexity. But with the right risk management practices, effective cybersecurity protection is achievable.

Leaders must recognise that cyber resilience is not simply a technical responsibility. It is an ongoing business continuity requirement. It protects your organisation’s reputation, financial stability, operational capability and future competitiveness.

Now is the time for decision makers to take these warnings seriously and act. The organisations that invest in continuous visibility, reliable controls and intelligence driven risk management will be the ones best able to withstand the challenges ahead.

Huntsman is committed to supporting that journey by equipping organisations with the ongoing insights and actionable intelligence needed to stay resilient in an increasingly hostile digital world.

BLOG POSTS

Related Cybersecurity Content

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.