Lessons from the Land Rover cyber attack: seeing risk before it strikes

Tenable APAC

By Scott Magill, Country Manager ANZ, Tenable
Thursday, 13 November, 2025


Lessons from the Land Rover cyber attack: seeing risk before it strikes

The cyber attack that recently crippled Jaguar Land Rover (JLR) is more than another cautionary tale in corporate IT. It’s a case study in how quickly a world-recognised brand can lose control of its production and manufacturing capabilities when visibility fails.

Since late August, JLR’s manufacturing lines across the UK have sat idle. Dealerships went offline. Suppliers halted production. Experts now rank it as Britain’s most expensive cyber incident, with direct and indirect losses estimated at near £1.9 billion. The breach didn’t just freeze servers; it froze an entire industrial ecosystem.

For Australian boards and executives, the most significant threat from a cyber attack is not the immediate fallout, but the unknown and unpredictable path to recovery.

This risk is magnified as organisations digitise supply chains, embed AI and connect operational technology (OT) with enterprise systems — often while mistakenly believing their OT environment is safely ‘air-gapped’ and immune. The JLR saga is a stark demonstration of this misplaced certainty.

The blind spot isn’t defence, it’s visibility

Corporate leaders often equate ‘security’ with stronger walls. More firewalls, more detection, more spending. But JLR’s experience shows that the modern cyber crisis doesn’t begin at the perimeter. It begins in the shadows, where legacy systems, third-party software, or remote devices quietly connect critical operations.

In JLR’s case, one compromised interface is believed to have cascaded through multiple systems, forcing shutdowns in both IT and OT environments. When a global manufacturer cannot identify its weak links or has limited visibility into potential attack paths, no amount of endpoint protection will be effective.

Boards must now treat visibility as the new currency of resilience. That means knowing what’s exploitable before attackers do: which assets matter most, where the interdependencies lie, and what a single point of failure could cost in days, not dollars.

The supply chain is your attack surface

Every enterprise today is a network of partners, suppliers and cloud dependencies. Yet many companies still assess cyber risk as if they were operating within four walls.

The JLR disruption radiated across thousands of suppliers, shattering the myth that OT is a completely separate environment. This incident should serve as a catalyst, compelling IT and OT business units to stop operating in silos and forge a more effective collaboration. This is precisely the risk now facing Australian industries — from energy and defence to transport and agriculture, where critical infrastructure and small subcontractors are digitally interlinked but not uniformly secured.

In today’s interconnected world, an attack is never isolated. The JLR production line halt is a stark reminder that a cyber attack on one company is an attack on its entire ecosystem, radiating disruption across its third-party supply chain.

From hindsight to foresight

What is the key lesson? While we can’t stop every attack, we can move from a solely reactive posture to a proactive one. This is where exposure management is emerging as the next strategic discipline in cyber resilience: a continuous process of mapping, prioritising and remediating vulnerabilities based on business impact, not technical severity.

Boards don’t need another dashboard of threat alerts. They ask business-centric questions, such as: “How prepared are we?” and “Has our cyber posture improved since last month?”

In Australia, where mandatory cyber-incident reporting and critical-infrastructure rules are tightening, this level of visibility is quickly becoming a fiduciary expectation. Regulators, insurers and shareholders will increasingly view unmanaged exposure as a governance failure, not an IT oversight. This visibility will also be equally expected of OT environments, especially those obligated to be SOCI compliant.

Resilience is an operational KPI

The JLR crisis is proof that cyber risk has crossed the line from technical threat to operational risk. It halted production, damaged supplier confidence and forced government intervention to stabilise jobs and contracts. That’s not an IT issue — that’s enterprise value destruction.

Every board should now ask the same questions of their own operations:

  • What are our blind spots? Do we know every system, supplier and dependency that could take us down?
  • What’s the real economic cost of a week of downtime? Not in theoretical estimates, but in lost output, lost customers and lost trust.
  • Who owns the response plan? Cyber resilience isn’t the CISO’s responsibility alone — it belongs to operations, finance, procurement and the board.

The new mandate is to know your weakness before they do

Jaguar Land Rover’s ordeal is not about misfortune; it’s about missed foresight. A single, unseen vulnerability brought a prestigious automaker and its supplier ecosystem to a standstill — an event that Australian boards should heed as a warning.

Seeing risk before it strikes isn’t a technical challenge; it’s a leadership one. It requires boards to stop trusting and start asking for proof.

Ultimately, the companies that survive the next wave of cyber attacks won’t just have better firewalls. They’ll have better visibility.

Image: JLR's manufacturing facility in Slovakia. Credit: Jaguar Land Rover.

Related Articles

Why AI agents are a new insider threat for business

AI-powered insiders are non-human actors operating within the perimeter, inheriting trusted...

Securing SMB organisations: closing the cyber gap through culture

Limited budgets and resources mean SMBs cannot financially prioritise cybersecurity as much as...

The silent cyberthreat lurking in mismanaged tokens

It took years of painful breaches for organisations to recognise the importance of secure...


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd