Cyber Contracts Not Meeting Board Expectations: Kaine Mathrick Tech CEO
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Cyber Contracts and Board Expectations in Australia
Quick Overview
- Current cybersecurity agreements fail to align with board expectations.
- Emphasis on cyber resilience and adherence to Australian standards is essential.
- New regulations necessitate improved incident reporting and response.
- Entities must align agreements with overarching strategic objectives.
Status of Cyber Contracts
According to Bradley Kaine, CEO of Kaine Mathrick Tech, Australian cybersecurity agreements are not fulfilling the expectations set by boards. Despite the Commonwealth’s introduction of new cyber risk model clauses, numerous entities continue to neglect integrating cyber resilience across all layers of their procurement and vendor management strategies.
Impact of Regulatory Changes
The enactment of the Cyber Security Act 2024 and the mandate for 72-hour ransomware payment reporting serve as key motivators for organisations to reconsider their incident response clauses. However, approaching these adjustments solely as compliance measures could prove harmful. The 2023–2030 Australian Cyber Security Strategy emphasizes the importance of cultivating trust and resilience within a digital economy, urging organisations to regard cybersecurity as a matter of boardroom importance.
Essential Contractual Elements for Cybersecurity
Incident response and recovery play vital roles in cybersecurity agreements. Kaine recommends that organisations incorporate a “Mandatory Incident Disclosure and Cooperation” clause, compelling vendors to promptly alert clients regarding any ransomware incidents, reveal all interactions with extortionists, and fully cooperate in forensic investigations and governmental reports.
Connecting Cybersecurity with Board Expectations
Boards are facing growing scrutiny from regulators, shareholders, and the public to guarantee cyber resilience. A significant number of cybersecurity contracts remain overly fixated on technical controls rather than strategic integration. To close this gap, Kaine proposes a “Board-Level Cyber Risk Reporting and Assurance” clause that requires regular, board-ready updates on cyber security posture, alignment with frameworks such as the ACSC’s Essential Eight, and provisions for third-party assessments.
Conclusion
Australian organisations must reassess their strategies concerning cybersecurity contracts to align with board expectations. Incorporating resilience, synchronizing with strategic objectives, and adhering to recent regulations are crucial steps to ensure that contracts address not only IT issues but also considerations of risk, governance, and accountability.