ASIC Action Against FIIG Securities Is a Line in the Sand for Cybersecurity in Australia

$2.5 million.
That’s what ASIC has now forced FIIG Securities Limited (FIIG) to pay not simply for suffering a breach, but for failing to maintain adequate cybersecurity controls for more than four years.

This isn’t just another breach headline. It’s a regulatory turning point for every Australian Financial Services (AFS) licensee and a warning shot for boards and exec teams still treating cyber as an “IT problem”.

In 2026, ASIC has made the message clear:
Cyber resilience is now a licence-to-operate issue.


What Actually Happened at FIIG

According to ASIC, FIIG’s cyber security failures occurred between 13 March 2019 and 8 June 2023. Those failures worsened the impact of a 2023 cyber attack that saw around 385GB of confidential data stolen and sensitive client information leaked on the dark web.

The compromised data included:

  • Driver’s licences
  • Passport information
  • Bank account details
  • Tax File Numbers (TFNs)

FIIG notified around 18,000 clients that their personal information may have been compromised.

Critically, FIIG admitted that:

  • Adequate cyber controls would have enabled earlier detection and response.
  • Complying with its own policies may have prevented some or all of the data exfiltration.

This wasn’t bad luck. This was governance, resourcing, and execution falling behind reality.


Why ASIC’s Action Matters (This Is the Shift)

The Federal Court ordered FIIG to pay:

  • $2.5 million in pecuniary penalties
  • $500,000 towards ASIC’s costs

The Court also ordered FIIG to undertake a compliance program involving an independent expert to uplift its cyber security and resilience.

“Cyber-attacks and data breaches are escalating in both scale and sophistication, and inadequate controls put clients and companies at real risk.”

“The consequences far exceeded what it would have cost FIIG to implement adequate controls.”

This is the first time civil penalties have been imposed for cyber failures under general AFS licence obligations.

Cyber resilience is no longer a recommendation. It’s enforceable.


The Failures Were Basic And That’s the Point

ASIC’s findings weren’t about exotic attacks. They were about fundamentals.

  • Insufficient skilled cyber personnel
  • No MFA for remote access
  • Poor firewall and security configuration
  • No structured patching program
  • No active threat monitoring
  • No mandatory cyber awareness training
  • No tested incident response plan

In 2026, these are baseline expectations especially for firms holding highly sensitive client data.


This Case Isn’t Just About FIIG

At the time of non-compliance, FIIG held approximately $3 billion in client assets.

ASIC’s position is clear: cyber investment must be fit-for-purpose based on size, risk profile, and data sensitivity.

“We’re not big enough to be a target” is no longer a defence it’s negligence.


The Real Lesson: Cyber Failures Are Governance Failures

  • Policies exist but aren’t enforced
  • Cyber ownership is unclear
  • Spend goes to tools, not capability
  • Risk posture can’t be articulated

Most organisations know what to do. They just don’t do it consistently.


What Boards and Executives Should Do Now

  • Can we clearly articulate our cyber risk posture?
  • Are controls aligned to data sensitivity?
  • Do we have accountable ownership?
  • Have we tested incident response in the last 12 months?
  • Would ASIC consider our controls “reasonable” today?

Final Takeaway

Cybersecurity is now a regulatory, financial, and trust obligation.

ASIC has shown it’s prepared to enforce it.


Next Steps

If you’re spending on cyber but not reducing risk, you’re exposed.

๐Ÿ“ฉ DM me on LinkedIn or visit thecyberguyau.com

Written by Ateeq Sheikh TheCyberGuyAU
Head of Cyber Business Development @ AUCyber 

Comments

Most Viewed

Qantas Breach: 6 Million Customers at Risk in Major Cyber Attack

Key Reforms Under the Privacy and Other Legislation Amendment Act 2024

Why Penetration Testing Is No Longer Optional for Australian Businesses (Even Small Ones)

Penetration Testing for Small Businesses in Australia