There’s a question I hear most often usually after something has gone wrong, not before:
“We had the tools. Why didn’t we see it coming?”
Technology doesn’t understand your business. People do.
It’s an uncomfortable question, because the answer is rarely technical. Most organisations don’t fail because they lack security technology. They fail because no one applied judgement early enough to recognise that something wasn’t normal.
In 2026, cyber resilience isn’t about buying better tools. It’s about how quickly people recognise risk in context and what happens next.
I’ve seen organisations with highly sophisticated security stacks suffer major incidents. I’ve also seen organisations with far simpler environments detect threats early and contain them quickly. The difference was never budget.
It wasn’t brand choice. It wasn’t how many tools were deployed.
It was context.
Technology doesn’t know which systems are critical at 2am. It doesn’t understand which access patterns are expected during a night shift. It can’t tell when something is technically allowed but operationally dangerous.
People can.
Detection Time is the metric that actually determines impact
Not:
- How many alerts fired
- How advanced the dashboard looks
- How comprehensive the report appears
Detection time determines:
- How far an attacker can move
- How much data they can access
- Whether recovery is straightforward or disruptive
- Whether an incident stays technical or becomes a business crisis
Across the incidents we’re involved in, the real damage is rarely caused by the initial compromise. It’s caused by the hours or days before anyone realised something was wrong.

Why Identity keeps winning (and why that isn’t changing)
Most modern incidents don’t start with malware. They start with identity.
A dormant account that was never reviewed. An inherited permission that no one questioned. A shared credential that “worked fine” until it didn’t.
Identity attacks succeed because they look legitimate. They blend into normal activity until someone applies judgement and asks:
“Does this make sense?”
Automation can highlight anomalies. Only experienced people can decide which anomalies matter.
That’s not a tooling gap. That’s a leadership and visibility gap.
Essential Eight: Discipline beats Maturity every time
One of the biggest misconceptions I see is treating the Essential Eight as a maturity race.
In practice, most organisations do not need to operate at higher maturity levels. Maturity Level Two and Three are rare and typically required only in highly regulated or specialised environments.
For the majority of organisations, the greatest reduction in real-world risk comes from consistent, disciplined execution of the fundamentals.
What matters isn’t claiming maturity, it’s whether controls actually work under real conditions:
- Patching what matters most, not everything
- Controlling privileged access properly
- Testing backups under pressure rather than assuming they work
- Reducing attack surface consistently
- Maintaining visibility across identity and endpoints
This work isn’t glamorous. It doesn’t generate headlines. But it’s what actually stops small issues from escalating.
Why Healthcare exposes these gaps faster than most sectors
As we move into 2026, we’re also looking more closely at how these patterns show up across different industries starting with healthcare.
Healthcare environments amplify the impact of poor visibility and delayed detection:
- Complex systems
- Legacy platforms
- Third-party integrations
- 24×7 operational pressure
In healthcare incidents, attackers rarely need sophistication. They need time.
When detection takes days instead of hours, consequences extend beyond systems affecting continuity of care, trust, and operational safety.
Healthcare doesn’t create new cyber problems. It exposes existing ones faster.

What “Good” actually looks like in 2026
The most resilient organisations we see today share common characteristics:
- Detection measured in hours, not days
- Visibility across identity, endpoints, and cloud
- Clear escalation paths
- Analysts empowered to act, not just observe
- Leadership that understands risk in business terms, not technical jargon
None of this comes from buying another tool. It comes from operating cybersecurity as a discipline, guided by experience and judgement.
Final Thoughts
Technology accelerates detection. People determine outcomes.
At AUCyber, our role isn’t to sell fear or complexity. It’s to apply judgement where it matters most quietly, consistently, and before incidents become visible.
That’s what leadership in cyber looks like in 2026.
