The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure
Posted: Wednesday, Jan 15

i 3 Table of Contents

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

At the Art of Play with my youngest some time back, I was reminded how covering things up only masks the problem. It got me thinking about the art of mastering cyber risk. Disconnected governance, incomplete controls or sheer technology complexity can mask the risk lurking beneath the surfaceโ€”untreated and potentially catastrophic.

Critical Infrastructure organisations are under increasing pressure to manage complex cybersecurity risks. The consequences of a cyber incident in sectors like energy, water, healthcare and transport can be devastatingโ€”not just financially, but in terms of safety, service availability and public trust.

Yet, despite the high stakes, many Critical Infrastructure organisations often manage operational technology (OT) risk separately from strategic organisation risk. This fragmented, manual approach canโ€™t keep pace with the evolving threat landscape. Risks remain siloed, under-prioritised and disconnected from business strategy. SUGGEST โ€˜risks in a fragmented, manual approachโ€™

Itโ€™s time for a shift. Critical Infrastructure leaders need to move beyond checklists and spreadsheets toward integrated, strategic risk management. This is not just good practiceโ€” in Australia itโ€™s a regulatory requirement under the Security of Critical Infrastructure (SOCI) Act and its Critical Infrastructure Risk Management Program (CIRMP) obligations.

The Challenge: OT Risk Buried in Spreadsheets

Operational technology (OT) environments in Critical Infrastructure sectors are complex, blending industrial systems with modern IT networks. Worryingly OT cybersecurity risks are often tracked in static spreadsheets disconnected from enterprise risk registers and decision-making.

This leads to several potential problems:

  • Fragmented Risk Visibility: OT risks arenโ€™t rolled up into business-level insights.
  • Overloaded Registers: Technical risks flood risk registers, leaving executives overwhelmed and disengaged.
  • Ineffective Treatment: Without clear ownership and strategic prioritisation, critical risks remain unaddressed.
  • Misallocation of Funding: Risk that isnโ€™t aligned across the enterprise could miss out on the funding needed to ensure that its treated correctly.

A spreadsheet canโ€™t keep up with todayโ€™s cyber threats. Critical Infrastructure organisations need a dynamic, scalable approach that connects cybersecurity risks with business impact.

Moving from Compliance to Resilience

The SOCI Act, through the CIRMP requirement, sets the foundation for better risk management. CIRMP obligates Critical Infrastructure organisations to actively manage four key areas:

  1. Cyber and Information Security Risks โ€“ Safeguarding digital and OT systems.
  2. Personnel Security Risks โ€“ Protecting against insider threats.
  3. Supply Chain Security Risks โ€“ Securing third-party relationships.
  4. Physical Security Risks โ€“ Defending against physical sabotage or intrusion.

But letโ€™s be clearโ€”compliance alone wonโ€™t make an organisation resilient. The goal isnโ€™t just to meet regulatory requirements; itโ€™s to build a risk management culture that genuinely protects critical services.

A Smarter Approach to Risk Management

Hereโ€™s how Critical Infrastructure organisations can move beyond spreadsheets and compliance to strategic, integrated risk management:

    1. Establish Context and Governance
  • Define your organisationโ€™s risk appetite in practical terms.
  • Understand which critical systems, assets, and supply chain components need protection.
  • Ensure executive and board-level accountability for risk management.
    1. Adopt a Fit-for-Purpose Framework

Choose a framework that support CIRMP and particularly OT environments:

  • ISO 31000 for enterprise-wide risk management.
  • ISO 27000 for cyber security risk management.
  • NIST Cybersecurity Framework (CSF) for cyber and information security.
  • AESCSF (Australian Energy Sector Cyber Security Framework) for energy sector OT-specific risks.
    1. Identify and Prioritise Risks Across Domains
  • Implement continuous risk identification processes across IT, OT, supply chain, and physical assets.
  • Roll up technical risks into organisation level strategic categories for executive decision-making.
    1. Translate Cyber Risks into Business Risks

Executives need to see how cybersecurity impacts business outcomes, not just technical metrics. Hereโ€™s how to roll up cybersecurity risks into business-aligned categories:

  • Safety: Cyber incidents that could cause physical harm to people or damage critical assets.
  • Availability: Disruptions to essential services like energy, water, and healthcare.
  • Integrity: Manipulation of data or systems that erode operational trust.
  • Confidentiality: Breaches of sensitive or regulated data.
    • Financial: Fraud, unauthorised transactions, or costly downtime.
    • Reputation: Loss of public trust and stakeholder confidence.
    1. Treat Risks with Clear Ownership
  • Agree clear ownership of risks across cyber, OT, supply chain, and physical security domains.
  • Develop risk treatment plans that prioritise impact over technical complexity.
    1. Monitor, Review, and Improve
  • Continuously monitor controls and update risk treatments.
  • Integrate lessons learned into risk management practices.
  • Keep the board engaged with meaningful, business-focused risk reporting.

Learning from Finance and Safety Disciplines

Cyber risk management doesnโ€™t need to start from scratch. The financial and safety sectors have spent over a century refining risk frameworks, governance models, and treatment strategies.

Applying these principles to cyber risk can accelerate resilience:

  • Quantify Risk: Use financial models to express cyber risk in dollar terms.
    • Consider using the Factor Analysis of Information Risk (FAIR) methodology for quantifying and managing risk.
  • Prioritise Like Safety: Apply safety risk methodologies to prioritise high-impact cybersecurity threats.
  • Governance Matters: Adopt accountability structures similar to financial compliance models.

This isnโ€™t about reinventing the wheelโ€”itโ€™s about learning from what works.

Beyond Spreadsheets: Building a Resilient Future

Operational and cybersecurity risks in Critical Infrastructure sectors are too critical to be buried in spreadsheets or treated as mere compliance checklists. Leaders must transform risk management into a dynamic, strategic function that directly supports service reliability and public safety.

The SOCI Actโ€™s CIRMP obligations set out the minimum requirements, but itโ€™s up to Critical Infrastructure leaders to turn those requirements into actionable, business-aligned strategies. By integrating OT risks into enterprise risk frameworks and translating cyber threats into strategic insights, organisations can truly protect Australiaโ€™s most critical services.

Sam Mackenzie
Sam Mackenzie grew up completely off-grid in country Victoria, Australia - an experience that fuels his passion for securing critical infrastructure, maintaining utility supply and ensuring cyber-physical safety. Over his career, he has worked with global brands overseas and household names in Australia, earning a reputation for building high-performance teams in the health, telecoms, energy and local government sectors. Samโ€™s leadership approach is defined by structured thinking, an ability to simplify complexity and developing culture as a catalyst for meaningful change. Cybersecurity Committee Member - Australian Computer Society (ACS) Management Committee Member - Australian Control Room Network Association (ACRNA)
Share This