Skip to the main content.

5 min read

The $5.8 Million Wake-Up Call: Why Australian M&A Needs Integrated Cybersecurity Partnership

The $5.8 Million Wake-Up Call: Why Australian M&A Needs Integrated Cybersecurity Partnership

What the Australian Clinical Labs Case Reveals About Modern Cyber Risk

The Federal Court's $5.8 million penalty against Australian Clinical Labs (ACL) has sent shockwaves through Australian boardrooms, and rightly so. But beyond the headline figure lies a more fundamental message: the traditional approach to cybersecurity in mergers and acquisitions is no longer fit for purpose.

As Grant Thornton's analysis makes clear, this wasn't simply a case of inadequate technical controls. The ACL decision exposes a systemic problem in how Australian organisations approach cybersecurity during acquisitions, revealing dangerous gaps between strategic advisory, operational delivery, and governance oversight. For businesses navigating Australia's increasingly complex regulatory landscape, the implications are profound.

When Advisory and Operations Live in Separate Worlds

The ACL case centres on a cyber incident at MedLabs, a business acquired by ACL. What makes this case particularly instructive is not the breach itself, but rather the governance failures that surrounded it. The Federal Court found that ACL's approach to cybersecurity during and after the acquisition was fundamentally flawed. Privacy and cyber obligations were treated as something to be addressed "eventually" rather than immediately, and accountability was diffused across multiple parties without clear ownership.

This reflects a pattern we see. Organisations engage cybersecurity consultants to conduct due diligence, receiving detailed reports that identify risks and recommend controls. But when the acquisition completes, there's often a disconnect. The advisory team moves on to the next project, operational teams struggle to interpret technical recommendations, and boards are left with limited visibility into whether cyber risks are actually being managed. The court was unequivocal: this approach is no longer acceptable.

Privacy and cybersecurity responsibilities begin on day one of an acquisition. Boards cannot rely solely on external advisors to determine breach notification requirements or defer implementation of critical controls. The acquiring entity remains fully accountable, regardless of third-party input.

The Hidden Cost of Vendor Complexity

What the ACL case also reveals is the danger of fragmented cybersecurity approaches. Many Australian organisations work with separate providers for advisory services, managed security operations, compliance assessments, and incident response. Each vendor delivers within their own domain, but nobody has complete visibility or accountability for the integrated cybersecurity posture.

When an incident occurs during an acquisition, this fragmentation becomes acutely problematic. Who owns the decision to notify regulators? Who is responsible for forensic documentation of the incident response? Who ensures that day one uplift plans are actually implemented with appropriate board oversight? In the ACL case, these questions appear to have been answered too slowly and with insufficient clarity.

The Office of the Australian Information Commissioner (OAIC) is now signalling a more assertive regulatory posture, prepared to litigate and set legal precedents. This represents a fundamental shift in the Australian regulatory landscape. Organisations can no longer treat privacy and cyber compliance as a checkbox exercise. They need integrated partnership that spans from strategic advisory through to continuous operational delivery.

What Comprehensive Cybersecurity Partnership Actually Means

Addressing the risks exposed in the ACL case requires a different approach, one that bridges the gap between boardroom strategy and operational excellence. Australian businesses need partners who can operate across the entire cybersecurity journey, from pre-acquisition due diligence through to sustained post-merger security operations.

This starts with deep cyber due diligence that goes beyond surface-level assessments. During M&A transactions, organisations must understand not just the technical security posture of the target business, but also inherited third-party dependencies, existing governance frameworks, and the practical challenges of security integration. This requires both technical expertise to assess controls and strategic insight to translate findings into board-ready risk assessments.

But due diligence is only the beginning. The Federal Court's emphasis on day one obligations means that organisations need clear, actionable uplift plans with defined accountability and board oversight. This is where many traditional advisory engagements fall short. Providing recommendations in a report is insufficient if there's no pathway to operational implementation.

Australian businesses need partners who can deliver both the strategic framework and the operational capability to execute it.

Ongoing operations present their own challenges. The ACL case highlights the importance of forensic incident response with documented decision-making, escalation paths, and rationales captured in real time. This level of rigour requires continuous monitoring capabilities, established breach readiness processes, and clear governance structures. It's not enough to have incident response plans sitting in documents. Organisations need adaptive security operations that can detect, respond, and document incidents with the precision that regulators now expect.

The Australian Context Matters

One of the striking elements of the ACL case is how specifically Australian it is. The regulatory framework, the OAIC's enforcement approach, the Privacy Act obligations, and the court's interpretation of reasonable steps all reflect the unique characteristics of the Australian cybersecurity landscape. This matters because generic, international approaches to cybersecurity may not adequately address local regulatory expectations.

Australian businesses face a complex web of requirements. The SOCI Act imposes obligations on critical infrastructure entities. The Privacy Act sets stringent standards for personal information handling. The Essential Eight framework provides government guidance on baseline security controls. The Notifiable Data Breaches scheme creates strict timeframes for breach notification. And as the ACL case demonstrates, the OAIC is now prepared to aggressively enforce these requirements.

Navigating this landscape requires deep understanding of Australian regulatory requirements combined with global threat intelligence. It's not sufficient to apply international best practices without considering local context.

Australian businesses need partners who understand both the technical requirements and the regulatory environment in which they operate, who can translate Essential Eight controls into business outcomes and explain OAIC expectations in the boardroom.

Beyond Compliance: Building Resilient Organisations

While the ACL case centres on regulatory compliance and penalty avoidance, the broader opportunity is to build genuinely resilient organisations. The risks exposed in this case are not unique to M&A transactions. They reflect systemic challenges in how Australian businesses approach cybersecurity governance, integrate operational security capabilities, and maintain accountability across complex vendor relationships.

The future of cybersecurity in Australia will be characterised by increasing regulatory scrutiny, evolving threat landscapes, and growing complexity. AI governance is emerging as a critical concern. Supply chain cyber risks continue to expand. Ransomware attacks are becoming more sophisticated. Nation-state threats are intensifying. Against this backdrop, fragmented approaches to cybersecurity become increasingly untenable.

What Australian organisations need are trusted partners who can deliver comprehensive cybersecurity solutions that adapt to changing circumstances. This means moving beyond project-based advisory engagements to sustained partnerships that provide continuous value. It means integrating strategic guidance with operational delivery so that board decisions translate directly into technical controls. It means reducing vendor complexity through unified security management while maintaining the flexibility to address emerging challenges.

The Path Forward

The ACL case represents a watershed moment for cybersecurity governance in Australia. It establishes clear expectations: privacy and cyber obligations begin immediately upon acquisition, governance failures will be scrutinised, accountability cannot be outsourced, and regulators are prepared to enforce compliance through litigation.

For Australian businesses engaged in M&A activity, the message is unambiguous. Traditional approaches that separate advisory from operations, that defer security improvements until post-integration, or that rely solely on external parties for critical decisions are no longer acceptable. The court has raised the bar, and organisations must respond accordingly.

But this also represents an opportunity. Businesses that embrace comprehensive cybersecurity partnership, that integrate strategic and operational capabilities, and that build robust governance frameworks will not only reduce regulatory risk but also create genuine competitive advantage. In an environment where cyber resilience increasingly determines business success, the ability to operate with confidence across complex threat landscapes becomes a strategic differentiator.

The question for Australian boards is not whether to invest in stronger cybersecurity governance, but how to structure that investment to deliver sustained value. The answer lies in moving beyond fragmented vendor relationships toward integrated partnerships that span from boardroom strategy to 24/7 security operations, delivering continuous protection backed by deep Australian expertise and global threat intelligence.

From compliance frameworks to round-the-clock monitoring, from M&A due diligence to adaptive incident response, Australian businesses need partners who can simplify cybersecurity complexity while maintaining the rigour that regulators and the Federal Court now clearly expect.

The ACL case has shown the cost of getting this wrong.

The opportunity now is to get it right.

Is your M&A cyber risk approach ready for post-ACL enforcement?

Let's discuss how comprehensive cybersecurity partnership can reduce regulatory risk and simplify vendor complexity.


Sources:

  • Grant Thornton Australia: "What the Australian Clinical Labs privacy case means for cyber governance and M&A risk" (https://www.grantthornton.com.au/insights/blogs/what-the-australian-clinical-labs-privacy-case-means-for-cyber-governance-and-ma-risk/)
  • Federal Court of Australia: Australian Clinical Labs decision (2025)
Why Smart Business Leaders Are Outsourcing Their Cybersecurity Risk Management

Why Smart Business Leaders Are Outsourcing Their Cybersecurity Risk Management

As a CEO myself, I understand the challenge of wearing multiple hats whilst running a growing business. Between managing cashflow, developing your...

Read More
Healthcare Under Siege: Why Managed Security Services Are Essential Against Growing Cyber Threats

Healthcare Under Siege: Why Managed Security Services Are Essential Against Growing Cyber Threats

The cyber threat landscape for healthcare continues to deteriorate, with the Data Breach Notification of the 2024 attack on McLaren Health Care...

Read More
March 2025 ISM Updates: Compelling Boards and Executives in Cyber

March 2025 ISM Updates: Compelling Boards and Executives in Cyber

In March 2025, the Australian Government's Information Security Manual (ISM) underwent significant updates, emphasising the critical role of boards...

Read More