Introduction
Cyber security has emerged as a core governance issue for Australian companies. As digital systems become integral to business operations, directors are increasingly expected to oversee cyber risk with the same diligence applied to financial, operational and legal risks. Major cyber incidents in Australia have demonstrated that inadequate controls can result in widespread data breaches, operational disruption and substantial reputational harm.

Under the Corporations Act 2001 (Cth), directors owe statutory and fiduciary duties that extend to cyber security. Regulatory bodies, including ASIC and APRA, have clarified that cyber resilience is no longer a technical function – it is an essential component of modern governance.
This article outlines the legal framework governing cyber risk oversight, the expectations placed on directors, and the measures organisations should adopt, to demonstrate compliance.
1. Directors’ Legal Duties and Cyber Security Oversight
1.1 Statutory Duty of Care and Diligence
Section 180(1) of the Corporations Act 2001 requires directors to exercise their powers and discharge their duties with the degree of care and diligence that a reasonable person would exercise in their position. As cyber threats increase in scale and sophistication, courts and regulators have recognised that cyber risk forms part of this duty.
A failure to implement adequate cyber-security controls, governance structures or incident-response mechanisms may constitute a breach of the duty of care and diligence. Directors must ensure that appropriate frameworks exist to identify, assess and mitigate cyber risks, and that oversight is active rather than assumed.
1.2 Non-Delegable Responsibility
Although directors may delegate operational tasks to executives, chief information security officers or external consultants, the responsibility for governance remains with the board. Delegation does not extinguish oversight obligations. Directors must demonstrate that they have obtained reliable information, asked critical questions and monitored the effectiveness of cyber-security measures.
1.3 Duty to Act in the Best Interests of the Company
Directors must act in good faith and in the best interests of the company. Cyber incidents can result in financial losses, regulatory penalties and reputational damage. Failure to oversee cyber risk adequately may therefore be inconsistent with this duty. Consideration of cyber resilience is now viewed as integral to protecting corporate value and stakeholder interests.
2. Expanding Expectations: Regulatory and Market Developments
Regulators have increasingly emphasised the need for active board involvement in cyber-security governance. ASIC has identified cyber resilience as a priority in its enforcement agenda, and recent litigation, including ASIC v RI Advice Group Pty Ltd [2022] FCA 496, confirmed that inadequate cyber-risk management can breach statutory obligations.
For APRA-regulated entities, Prudential Standard CPS 234 requires organisations to maintain information-security capabilities commensurate with their threat environment. This includes testing controls, assessing third-party risks and ensuring governance frameworks support continuous improvement. Market expectations have also shifted, with investors and customers viewing cyber maturity as a key indicator of organisational integrity.
3. Cyber Risk and the Duty of Care
3.1 Cyber Threats as Governance Issues
Cyber risk is no longer confined to technical vulnerabilities. It encompasses operational disruption, data loss, intellectual property exposure, supply-chain failure and regulatory liability. Directors must approach cyber security as part of the enterprise risk-management framework. This requires visibility over risk assessments, control testing, incident reporting and remediation status.
3.2 Proportionality and Industry Context
Expectations vary depending on industry, organisational complexity and data sensitivity. Entities in financial services, healthcare, energy and telecommunications face heightened regulatory scrutiny. Directors must ensure that cyber-security measures are proportionate to the organisation’s risk exposure. Insufficient investment, inadequate staffing, or outdated systems, may indicate a governance failure.
4. Preventative Governance Measures
Effective governance requires directors to adopt a proactive approach to cyber resilience. Boards should ensure that the organisation maintains a structured risk-management framework, with cyber risk embedded as a standing agenda item. Key measures include:- annual or semi-annual independent penetration testing, regular cyber maturity assessments, and clearly documented policies.
Training also plays a critical role. Directors and senior management must maintain current knowledge of cyber-risk trends, regulatory updates and emerging threats. Incident-response planning should be rehearsed, documented and updated regularly, ensuring the organisation can respond promptly and lawfully in the event of a breach.
5. Incident Response and Disclosure Obligations
5.1 ASX Continuous Disclosure
For listed entities, ASX Listing Rule 3.1 requires immediate disclosure of information that a reasonable person would expect to have a material effect on the price or value of securities. Cyber incidents may trigger disclosure where they cause material operational disruption, expose sensitive customer data, or create regulatory or legal exposure.
5.2 Privacy Act and Mandatory Data Breach Notification
Under the Notifiable Data Breaches (NDB) scheme, organisations must notify the Office of the Australian Information Commissioner (OAIC) and affected individuals where a breach is likely to result in serious harm. Directors must ensure that processes exist to detect, investigate and escalate incidents promptly, so that compliance with statutory timelines can be demonstrated.
5.3 Regulatory Reporting for APRA-Regulated Entities
Under CPS 234, significant information-security incidents must be reported to APRA within strict timeframes. Directors must ensure that incident-escalation protocols incorporate regulatory reporting obligations, and that these processes are tested for efficiency.
6. Governance Structures Supporting Cyber Oversight
Boards may strengthen oversight, by establishing risk committees or cyber subcommittees, to provide more detailed scrutiny of cyber-security frameworks. These structures allow directors to review incident reports, audit outcomes, threat intelligence and remediation progress in a focused environment.
Engagement with management is essential. Directors should receive regular briefings from the CISO or equivalent executive, including updates on system vulnerabilities, audit findings, control effectiveness and compliance with industry standards such as ISO 27001 or the NIST Cybersecurity Framework.
7. Liability and Consequences of Non-Compliance
Failure to manage cyber risk may expose directors to regulatory enforcement, civil litigation or allegations of breach of duty. ASIC has signalled a willingness to pursue enforcement where governance failures contribute to inadequate cyber resilience. Class actions following major data breaches have further demonstrated the legal and financial risks associated with insufficient oversight.
In addition to legal consequences, poor cyber governance can result in loss of market confidence, increased insurance premiums, business interruption and long-term reputational damage. Boards are therefore expected to demonstrate disciplined, well-documented risk oversight.
Conclusion
Cyber security now forms a material component of directors’ statutory and fiduciary responsibilities. Australian regulators expect active, informed and ongoing oversight of cyber risk as part of contemporary corporate governance. Organisations must implement structured risk-management frameworks, clear reporting lines and well-tested incident-response mechanisms. Directors who can demonstrate documented diligence, proportional investment in security controls, and continuous monitoring, are better positioned to satisfy their legal obligations and to protect organisational value.
FAQs
Are directors personally liable for cyber breaches?
Directors may be liable where a failure to exercise care and diligence contributes to inadequate cyber-security governance, resulting in a breach of statutory duties or regulatory obligations.
What does “duty of care” mean in cyber security?
The duty of care requires directors to identify, assess and monitor cyber risks and ensure the organisation has appropriate policies, controls and oversight mechanisms in place.
Can directors delegate cyber-security obligations?
Operational tasks may be delegated, but oversight cannot. Directors remain legally accountable for the adequacy of cyber-risk governance.
What happens if a company ignores cyber risks?
Ignoring cyber risks may lead to regulatory enforcement, civil litigation, disclosure breaches and reputational damage. It may also constitute a breach of directors’ duties.


