ARTICLE
4 March 2026

Cross Examining Cyber EP23: Cross Examining Professor Ciaran Martin – Part 2 (Podcast)

KL
Herbert Smith Freehills Kramer LLP

Contributor

Herbert Smith Freehills Kramer is a world-leading global law firm, where our ambition is to help you achieve your goals. Exceptional client service and the pursuit of excellence are at our core. We invest in and care about our client relationships, which is why so many are longstanding. We enjoy breaking new ground, as we have for over 170 years. As a fully integrated transatlantic and transpacific firm, we are where you need us to be. Our footprint is extensive and committed across the world’s largest markets, key financial centres and major growth hubs. At our best tackling complexity and navigating change, we work alongside you on demanding litigation, exacting regulatory work and complex public and private market transactions. We are recognised as leading in these areas. We are immersed in the sectors and challenges that impact you. We are recognised as standing apart in energy, infrastructure and resources. And we’re focused on areas of growth that affect every business across the world.
What makes a great lawyer in a cyber incident response? This is a key question that I explored during part 2 of our podcast with Professor Ciaran Martin, a world leading cyber thought leader.
Australia Technology
Cameron Whittfield’s articles from Herbert Smith Freehills Kramer LLP are most popular:
  • within Technology topic(s)
Herbert Smith Freehills Kramer LLP are most popular:
  • within Technology, Transport, Media, Telecoms, IT and Entertainment topic(s)
  • with Inhouse Counsel
  • with readers working within the Law Firm industries

Conversations on cyber and the law

What makes a great lawyer in a cyber incident response?

This is a key question that I explored during part 2 of our podcast with Professor Ciaran Martin, a world leading cyber thought leader.

The questions challenged Ciaran but he answered it succinctly as "one do and one don't". The best incident leaders loosen control (the "do"), rather than tighten it (the "don't"). A damaging instinct in a crisis (often driven by impractical lawyering) is locking everything down and keeping help out for fear of liability. In practice, faster recovery usually comes from working openly with the broader cyber response community. Most people genuinely want to help.

Here were my other favourite pieces of wisdom shared by Ciaran coming out of the discussion.

  1. The "pyramid of liability" has inverted. When something goes wrong, we still reach for the easiest explanation – i.e. "someone clicked the link". That's comforting, but it misses the point. Most incidents are really about upstream failures — poor software design, weak procurement choices, and a lack of accountability for vendors and platforms. Blaming frontline users (including our corporates) just ignores the real source.
  2. Transparency after an incident doesn't destroy trust, but builds it. There's a strong instinct (again, I'm sorry, but often driven by legal) to say as little as possible. But if you actually look at major incidents over time, the organisations that were sensibly open about what happened and what failed didn't suffer lasting reputational or commercial damage. If anything, they earned goodwill — from regulators, peers and the broader ecosystem. The "what" are questions of fact and are often not protected by privilege anyway.
  3. Cyber planning breaks down when it obsesses over data and ignores continuity. There are numerous examples in the healthcare space. Legal duties pushed decision‑makers to prioritise protecting data over keeping life‑saving services running. That's a structural flaw. In some crises, loss of service is far more harmful than loss of data — yet our frameworks don't always reflect that.
  4. Along this line, operational outages are more dangerous than data breaches — and we're not ready for them. When ports, airlines or hospitals go down, the economic and social impact is immediate and severe. These aren't just "bigger data breaches"; they're a different category of risk altogether. Australia hasn't yet experienced one at scale, but when it does, the shock will be national. It's certainly my biggest fear.
  5. Ransomware only works if we treat threats as credible. Data extortion relies on panic and amplification. Australia's experience shows that when institutions, media and law enforcement refuse to play along — and don't amplify stolen data — attackers lose leverage, even if data technically leaks. The economics of the cyber criminal model collapse surprisingly quickly.

There's loads more in the full podcast (~20 minutes). Definitely worth a save and watching or listening on your commute to/from work. This is cross examining Professor Ciaran Martin – Part 2. Here we go...

Watch this episode

1752258a.jpg

Listen to this episode

Herbert Smith Freehills Kramer Podcasts · Cross Examining Cyber EP23: Professor Ciaran Martin – Part 2

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More