About Pricing Explore Login
Free Market Intelligence ← Back
Cybersecurity Market Structure And Growth Dynamics | Renatus

Australian Cybersecurity Market Structure and Growth Dynamics

Market Intelligence

Download
Downloading PDF...

Australian organisations will spend AUD $7.5 billion on information security in 2026 — a 9.5% increase on the prior year — with security services alone accounting for AUD $3.7 billion of that total.[Gartner] The market is not being driven by discretionary IT spending cycles. It is being driven by breach pain: Optus, Medibank, and a string of follow-on incidents have made cybersecurity a board-level obligation, not a technology team decision. The Australian Signals Directorate received 87,400 cybercrime reports in FY2024–25, and its Cyber Security Hotline fielded 42,500 calls — up 16% year on year.[ASD]

The structural tension in this market is the gap between the scale of regulation being layered on and the pace at which vendors can credibly serve it. The 2023–2030 Cyber Security Strategy, the Security of Critical Infrastructure Act amendments under active consultation in April 2026, and APRA's CPS 230 operational resilience standard are creating compliance-driven purchasing that bypasses normal budget cycles. Critical infrastructure operators — energy, transport, health, financial services — now face enforceable ministerial directions for risk management, with new vendor-risk direction powers proposed that would let government intervene directly in which technology products those operators can use.[Home Affairs] Global vendors including CrowdStrike and Palo Alto Networks are named in the market but hold no publicly disclosed Australian market share. The absence of a dominant local player, combined with Accenture's acquisition of CyberCX announced in 2025, signals that consolidation is accelerating before any one player has locked in the market.

Technology & Software - Cybersecurity · Australia · 14 Apr 2026
Australian infosec spend (2026) AUD $7.5B 9.5% growth on 2025
Security services segment AUD $3.7B Largest single category; 6.9% growth
Security software segment AUD $3.3B Fastest-growing category; 12.3% growth
ASD cybercrime reports (FY2024–25) 87,400 Hotline calls up 16% YoY

Key findings

  1. Regulation is now the primary demand engine — not technology appetite. The 2023–2030 Cyber Security Strategy, SOCI Act amendments under consultation in April 2026, and APRA's CPS 230 are creating enforceable purchasing obligations for critical infrastructure operators and financial services firms that bypass discretionary IT budget cycles.[Home Affairs]

  2. Security software is growing at 12.3% — nearly double the rate of services. Gartner projects Australian security software spend at AUD $3.3 billion in 2026, growing at 12.3% versus 6.9% for services, driven by demand for Extended Detection and Response, Identity and Access Management, and AI-enabled compliance tooling.[Gartner]

  3. No single vendor controls the Australian market — and consolidation is already underway. Accenture's 2025 acquisition of CyberCX is the most visible consolidation move; no Australian or global vendor holds a publicly disclosed market share figure for this market, leaving competitive position effectively unmeasured.[Accenture]

  4. AI is doubling the threat volume faster than defences can respond. IDC data shows 76% of Australian organisations reported at least a twofold increase in threat volume linked to AI-powered attacks, while 51% had already been materially affected — creating demand that outpaces any single vendor's current product roadmap.[IDC]

1. Market Size

A AUD $7.5 billion market in 2026 — and the software segment is growing at twice the rate of services.

Gartner's figure is the most reliable single number in this market — and it tells a story about where the money is moving.

Gartner forecasts total Australian information security spending at AUD $7.5 billion in 2026, up 9.5% from 2025.[Gartner] Security services — managed security, consulting, and professional services — account for AUD $3.7 billion and are the single largest category, growing at 6.9%. Security software accounts for AUD $3.3 billion and is growing faster, at 12.3%, driven by demand for Extended Detection and Response platforms, Identity and Access Management tools, and AI-enabled compliance software.[Gartner]

Australian Information Security Spending by Segment, 2026
AUD billions, Gartner forecast, 2026
Total infosec spend (2026)
AUD $7.5B
Up 9.5% on 2025 — Gartner
Security services
AUD $3.7B
Largest segment; 6.9% growth
Security software
AUD $3.3B
Fastest-growing; 12.3% growth
Mordor CAGR to 2031
13.6%
USD $10B → $19B; broader scope than Gartner

A separate estimate from Mordor Intelligence puts the Australian cybersecurity market at USD $10.04 billion (approximately AUD $15.6 billion at mid-2026 exchange rates) growing at a 13.58% CAGR to reach USD $18.98 billion by 2031.[Mordor] The gap between Gartner and Mordor Intelligence is significant — likely explained by differing scope definitions, with Mordor including hardware, network security infrastructure, and operational technology security that Gartner may classify separately. This report uses the Gartner figure for 2026 spending as it is the most detailed Tier 1 estimate available, but the Mordor trajectory is consistent with the direction of travel.

IBISWorld estimates the narrower cybersecurity software and services segment — excluding hardware and network infrastructure — at AUD $2.1 billion in 2026, growing at a 2.2% CAGR from 2020–2025.[IBISWorld] The low CAGR from IBISWorld likely reflects their narrower definition of software services only. The Gartner total is the most comprehensive and reliable benchmark for market sizing purposes.

2. Demand Drivers

Breach pain and regulatory obligation are driving demand that no budget cycle can switch off.

The Optus and Medibank breaches did not just damage those companies — they changed how every Australian board thinks about cyber risk.

The Australian Signals Directorate recorded 87,400 cybercrime reports in FY2024–25, with its Cyber Security Hotline fielding 42,500 calls — a 16% increase year on year.[ASD] Ransomware attacks rose 36% over the same period. Zero-day exploits used in attacks increased 46% in 2024–2025.[ASD] These are not abstract threat statistics. They are the operational context in which Australian CISOs are building budgets and boards are approving them.

AI-powered attacks are accelerating the threat environment faster than most vendor roadmaps can match. IDC data shows 76% of Australian organisations reported at least a twofold increase in threat volume, and 51% had already been materially affected by AI-powered attacks.[IDC] This is creating demand for detection and response capabilities that did not exist as product categories three years ago — specifically Extended Detection and Response platforms and AI-native security operations tooling.

Primary Forces Driving Australian Cybersecurity Spending Growth
Structural demand drivers, 2025–2026
High-profile breach precedent Demand trigger
Optus and Medibank breaches elevated cybersecurity to board-level agenda across all sectors, creating ongoing spend pressure regardless of IT budget cycles.
AI-powered threat escalation Threat multiplier
76% of Australian organisations report a twofold-plus increase in threat volume from AI-powered attacks — IDC — driving demand for detection and response tools that did not exist as categories three years ago.
2023–2030 Cyber Security Strategy Regulatory mandate
Six national cyber shields creating enforceable compliance obligations, with Horizon 2 adding Zero Trust requirements under consultation in 2025.
SOCI Act and Critical Infrastructure Regulatory mandate
Security of Critical Infrastructure Act amendments proposed in April 2026 introduce vendor-risk direction powers, creating procurement obligations for energy, transport, and health operators.
APRA CPS 230 Operational Resilience Financial sector mandate
CPS 230 requires financial services firms to demonstrate operational resilience, translating directly into identity, access management, and incident response procurement.
Essential Eight Compliance Government baseline
ASD's Essential Eight framework functions as a de facto procurement filter across federal and state government — vendors must demonstrate alignment to win public sector contracts.

The compliance layer sits on top of the threat layer and amplifies it. The 2023–2030 Cyber Security Strategy's first horizon (2023–2025) mandated foundational controls across critical infrastructure. Horizon 2, under consultation through July–August 2025, adds Zero Trust adoption requirements.[Home Affairs] APRA's CPS 230 operational resilience standard adds a further purchasing mandate for financial services firms. The result is that cybersecurity has moved from a discretionary IT spend line to an auditable compliance obligation for the largest buyers in the market.

3. Regulatory Environment

Three overlapping regulatory frameworks are converting cybersecurity from a preference into an obligation — and one of them can now dictate which vendors you use.

The proposed vendor-risk direction power under the SOCI Act amendments is the most commercially significant regulatory development in this market.

The 2023–2030 Cyber Security Strategy, released 22 November 2023, is structured across six shields and three horizons. Horizon 1 (2023–2025) focused on foundational controls — patching, access management, threat sharing. Horizon 2, currently under consultation, adds Zero Trust architecture as a compliance requirement and expands public-private threat intelligence sharing obligations.[Home Affairs] Every horizon adds new product categories to the compliance checklist.

The Security of Critical Infrastructure Act 2018 amendments are the regulatory development with the sharpest commercial teeth. An independent review completed in January 2026 by Jill Slay recommended refinements for interconnected supply chain risks. The April 2026 consultation proposes a graduated ministerial direction framework — and critically, a new vendor-risk direction power that would allow the government to direct critical infrastructure operators to stop using specific vendors or products.[Home Affairs] If enacted, this creates a compliance-driven vendor selection constraint unlike anything previously in the market. Operators in energy, transport, water, and health would need to demonstrate ongoing vendor compliance — not just at procurement, but continuously.

Key Regulatory Frameworks Shaping Australian Cybersecurity Procurement
Status as of April 2026
2023–2030 Australian Cyber Security Strategy (Active — Horizon 2 under consultation)

Six shields covering citizen resilience, safe technology, threat sharing, critical infrastructure protection, sovereign capability, and global leadership. Horizon 2 adds Zero Trust requirements.

Issued by
Department of Home Affairs
Horizon 1
2023–2025, foundational controls
Horizon 2
Consultation July–August 2025
Demand impact
Zero Trust, threat sharing platforms, incident response
Security of Critical Infrastructure Act 2018 (SOCI) — 2026 Amendments (Under consultation — April 2026)

Proposed vendor-risk direction power allows government to direct critical infrastructure operators away from specific vendors or products deemed systemic risks.

Review completed
January 2026 — Jill Slay
Consultation opened
April 2026
Sectors covered
Energy, transport, water, health, communications
Demand impact
Continuous vendor compliance, supply chain security tools
APRA CPS 230 — Operational Resilience Standard (In force from 1 July 2025)

Requires APRA-regulated entities to demonstrate operational resilience and third-party risk management, including cybersecurity incident recovery within defined timeframes.

Issued by
Australian Prudential Regulation Authority
Entities covered
Banks, insurers, superannuation funds
Demand impact
IAM, managed detection and response, third-party risk tools
ASD Essential Eight Maturity Model (Active — de facto procurement standard)

Eight baseline controls functioning as a procurement filter for government contracts. Vendors must demonstrate alignment; government entities must demonstrate maturity levels.

Issued by
Australian Signals Directorate
Applies to
Federal and state government entities and suppliers
Demand impact
Patching, application control, multi-factor authentication tooling

APRA's CPS 230, operative from 1 July 2025, requires all APRA-regulated entities — banks, insurers, superannuation funds — to maintain operational resilience, including mapping third-party service provider risk and demonstrating incident recovery capability within defined timeframes. This has driven a wave of identity and access management procurement and managed detection and response contracts in the financial sector. The ASD Annual Cyber Threat Report confirmed 11% of ASD-assisted incidents in FY2023–24 involved critical infrastructure, providing the empirical basis for both the SOCI reforms and the CPS 230 obligations.[ASD]

4. Buyer Landscape

Government and financial services are buying under compliance mandates — healthcare is buying in response to breach trauma.

The Medibank breach in 2022 did more to open the healthcare cybersecurity market than any vendor sales effort.

The four largest buyer segments in the Australian cybersecurity market are federal and state government, financial services, healthcare, and critical infrastructure operators. Each is buying for a different underlying reason, which matters for vendors trying to position product and services.[IBISWorld] Government procurement is filtered through the Essential Eight maturity model and, for federal entities, the ASD's panel frameworks. A vendor that cannot demonstrate Essential Eight alignment cannot win a federal contract — full stop. This makes compliance certification a market-entry requirement, not a differentiator.

Financial services firms are buying under two simultaneous mandates: APRA's CPS 230 operational resilience standard (operative from July 2025) and, for systemically important institutions, SOCI Act obligations. The combination is driving Identity and Access Management and managed detection and response procurement at volume. Sydney and Melbourne, as the centres of Australia's financial services industry, account for a disproportionate share of enterprise-grade cybersecurity services demand.[IBISWorld]

Australian Cybersecurity Buyer Segments by Demand Intensity
Qualitative demand intensity index, 2025–2026 (1–10 scale, analyst assessment based on available evidence)
Federal & State Government
Very High — Essential Eight + ASD panel mandates
Very High — Essential Eight + ASD panel mandates
Financial Services
Very High — CPS 230 + SOCI obligations
Very High — CPS 230 + SOCI obligations
Healthcare
High — post-Medibank breach urgency
High — post-Medibank breach urgency
Critical Infrastructure (Energy/Transport)
High — SOCI Act vendor-risk directions
High — SOCI Act vendor-risk directions
Mid-market Enterprise
Moderate — rising awareness, budget constrained
Moderate — rising awareness, budget constrained
SME
Low — fragmented, underserved
Low — fragmented, underserved

Healthcare is the fastest-growing demand segment by buyer anxiety, if not yet by absolute spend. The Medibank breach exposed 9.7 million patient records and triggered regulatory scrutiny that has not abated. Healthcare CISOs now operate under breach-awareness conditions that did not exist before 2022 — and without the same level of existing security infrastructure that banks have built over decades. This creates an addressable market where buyers need foundational tooling, not advanced capabilities, which favours managed security service providers over pure-play software vendors. No verified sector-level budget figures are publicly available for healthcare cybersecurity specifically — this gap limits confidence in sizing that segment precisely.

5. Competitive Landscape

No vendor has locked in the Australian market — and Accenture's acquisition of CyberCX signals that the consolidation phase has begun.

When a firm the size of Accenture pays to acquire the largest independent Australian cybersecurity player, it is telling you something about the market's trajectory.

The competitive landscape in Australian cybersecurity is dominated by global vendors — CrowdStrike, Palo Alto Networks, Cisco, Check Point, CyberArk — operating alongside large systems integrators like Accenture and IBM, and a layer of locally headquartered managed security service providers.[Mordor] No vendor holds a publicly disclosed Australian market share figure. This is an important data absence: it tells you that no single player has achieved the kind of dominance that generates analyst tracking. The market is genuinely fragmented.

Accenture's 2025 acquisition of CyberCX — described in the Accenture announcement as expanding cybersecurity capabilities across Asia-Pacific — is the most consequential competitive move in the market in recent years.[Accenture] CyberCX was the largest independent Australian cybersecurity services firm, with operations spanning managed security, incident response, and government advisory. Accenture's acquisition does two things at once: it removes the most credible local challenger from independent competition and it gives a global systems integrator local market depth and existing government relationships. For every other player in the managed security space, this changes the competitive calculus.

Global software vendors — CrowdStrike and Palo Alto Networks in particular — are named by Mordor Intelligence as market leaders but without Australian-specific revenue or share data.[Mordor] Their dominance in endpoint protection and network security globally does not automatically translate to Australian market share, where government procurement rules, data sovereignty requirements, and Essential Eight alignment affect vendor selection in ways that are different from other markets. Local MSSPs like Macquarie Technology, Borderless CS, and Sekuro are mentioned in third-tier sources but without verifiable revenue or contract data — this report does not assign those claims weight.

Named Players in the Australian Cybersecurity Market
Competitive positioning, 2025–2026 — no vendor-level market share data publicly available
Accenture (incl. CyberCX) Global — locally scaled
Move
Acquired CyberCX in 2025 — largest independent Australian cyber firm
Strength
Government relationships, managed security, incident response
Revenue (AU)
Not publicly disclosed at segment level
CrowdStrike Global — endpoint dominant
Position
Named Mordor Intelligence market leader — no AU share disclosed
Strength
Falcon platform — endpoint detection and response
Risk
July 2024 global outage created reputational exposure in AU government accounts
Palo Alto Networks Global — platform play
Position
Named Mordor Intelligence market leader — no AU share disclosed
Strength
Integrated platform across network, cloud, and SOC
Strategy
Platformisation — bundling to replace point solutions
IBM Security Global — enterprise services
Position
Listed as top-5 player in AU market by third-tier sources
Strength
Mainframe-adjacent enterprise accounts, QRadar SIEM platform
Revenue (AU)
Not publicly disclosed
Local MSSPs (Macquarie Technology, Sekuro, Borderless CS) Local — unverified
Data quality
Mentioned in Tier 3 sources only — no revenue or contract data
Positioning
Regional focus, SME and mid-market, Essential Eight advisory
Risk
Accenture/CyberCX acquisition removes their most natural exit path
6. Market Structure

Services revenue dominates today — but software is where the margin and the growth are concentrated.

A market where services are larger than software is a market still in the deployment phase. That changes as platforms mature.

Security services account for 49% of total Australian information security spending in 2026 — managed security, consulting, and professional services.[Gartner] This is characteristic of a market where organisations lack internal capability and are outsourcing to providers. Security software accounts for 44% and is the fastest-growing category. The remaining 7% sits across network security equipment and other hardware-adjacent spend. The relative weighting of services over software is not unique to Australia — it reflects the global pattern in markets where the regulatory compliance burden is high and in-house expertise is scarce.

Australian Information Security Spending by Category, 2026
Share of AUD $7.5B total, Gartner forecast
Security Services (managed, consulting, professional) 49%
Security Software (XDR, IAM, SIEM, cloud security) 44%
Network Security Equipment & Other 7%

The 12.3% growth rate in security software versus 6.9% in services is the most important structural signal in the market.[Gartner] As organisations mature their security posture — particularly under Essential Eight compliance requirements — they shift from buying managed services to buying software that automates what the managed service was providing. This is the standard arc of enterprise software adoption, and it compresses margins for MSSPs while expanding them for software platform vendors. The vendors best positioned for this transition are those whose software is already embedded in compliance workflows — identity management, endpoint protection, and SIEM platforms.

The talent shortage accelerates this dynamic. Australia faces a documented cybersecurity skills gap — ASD's own workforce development initiatives acknowledge the shortfall — which means organisations cannot hire their way out of capability gaps.[ASD] Software that replaces headcount is not optional; it is structural. This creates durable demand for automation-heavy security platforms, particularly AI-native detection and response tools, that is unlikely to reverse as long as the talent market remains constrained.

7. Capital and M&A

M&A is the defining capital story — not venture funding — and Accenture's move sets the price of market access.

Global consolidation in cybersecurity is running at USD $100 billion in 2025 — and Australia is not insulated from that.

Named venture capital or private equity deals specifically targeting Australian cybersecurity companies between 2023 and 2026 are not documented in any available public source. This absence is a finding: the Australian cybersecurity investment landscape at the venture stage is either not generating deals of sufficient scale to attract analyst tracking, or those deals are not being publicly disclosed at a level that would generate Tier 1 or Tier 2 coverage. No confidence can be placed in any specific deal number or fund name without that documentation.

The global M&A picture is clear, even if the Australian picture is not. Global cybersecurity M&A in 2025 reached approximately USD $100 billion, with 92% deployed by strategic acquirers and 8% by private equity.[Accenture] Strategic acquirers — technology companies and professional services firms — are using M&A to buy market position, customer relationships, and talent rather than building organically. Accenture's acquisition of CyberCX fits exactly that pattern. The implication for Australian market participants is that the most likely exit for a locally scaled cybersecurity firm is acquisition by a global strategic, not a public market listing or PE buyout.

What the Capital Flow Evidence Shows
Investment and M&A signals, Australian cybersecurity market, 2024–2026
1.
No named VC or PE deals publicly documented in Australian cyber, 2023–2026
Available Tier 1 and Tier 2 sources contain no deal-level data for Australian cybersecurity venture or private equity investment. The market may be transacting below the disclosure threshold — or offshore investors are not yet prioritising Australia at scale.
2.
Accenture's CyberCX acquisition sets the strategic benchmark
By acquiring the largest independent local player, Accenture has established that Australian cybersecurity services firms with government relationships are valued M&A targets for global professional services firms. No acquisition price was publicly disclosed.
3.
Global strategic M&A ran at USD $100B in 2025 — 92% by strategic buyers
The global pattern — strategic acquirers dominating over PE — applies directionally to Australia. Local firms are more likely to be acquired than to attract financial sponsor capital at scale.
4.
AUD $587M government strategy investment creates indirect demand-side de-risking
The 2023–2030 strategy's committed government funding converts into procurement contracts. Firms with government contracts carry lower revenue risk, making them more attractive to acquirers.
5.
AI-native security firms are the global venture capital priority — Australia may follow
Global VC is concentrating on AI-native security platforms. If Australian firms are building in this category, the investment precedent exists globally — but no Australian-specific deal evidence is yet documented.

The Australian government has committed AUD $587 million to the 2023–2030 Cyber Security Strategy, with AUD $143 million allocated in the first horizon (2023–2025) to foundational measures including ASD capability uplift and critical infrastructure protection.[Home Affairs] Government investment does not flow directly to vendors as investment capital, but it does create procurement demand that de-risks private investment in the sector. Public sector contracts provide the revenue predictability that makes an Australian cybersecurity firm a credible acquisition target.

8. Competitive Forces

Regulatory barriers and buyer concentration give incumbents more protection than a fragmented market usually provides.

Essential Eight certification is not a checklist — it is a moat. Vendors who have it can charge for it.

Supplier power in this market sits primarily with the global software platform vendors — CrowdStrike, Palo Alto Networks, Microsoft, and Cisco — who set the underlying technology stack that most Australian managed security providers resell or integrate. A local MSSP that has built its service delivery on a single global platform has limited negotiating leverage with that vendor. This creates margin pressure at the MSSP layer that the platform vendors do not share.

Porter's Five Forces — Australian Cybersecurity Market
Competitive intensity assessment, 2026
Threat of New Entrants Medium
Essential Eight compliance, ASD panel inclusion, and staff clearance requirements create high barriers in government. Commercial enterprise and SME segments are more accessible. AI-native startups are entering the commercial market but face credibility gaps in regulated sectors.
Supplier Power High
Global platform vendors — CrowdStrike, Palo Alto Networks, Microsoft, Cisco — control the underlying technology stack. Local MSSPs reselling or integrating these platforms have limited negotiating leverage. Platform consolidation by Palo Alto specifically is squeezing the point-solution reseller layer.
Buyer Power Medium
Government and large enterprise buyers exercise strong procurement leverage through panel frameworks and multi-year contracts. SME buyers are fragmented and price-inelastic. Compliance mandates reduce buyer discretion — if you must buy, your negotiating position weakens.
Threat of Substitutes Low
No credible substitute exists for regulated-sector cybersecurity compliance. In-house security operations are a partial substitute but require talent the market cannot supply. Doing nothing is not a viable substitute when regulatory penalties exist.
Competitive Rivalry High
The market is fragmented with no disclosed leader — global platforms, large SIs, and local MSSPs compete across overlapping segments. Accenture's CyberCX acquisition concentrates the services segment and intensifies rivalry for the remaining large managed security accounts.

Buyer power is significant in the enterprise and government segments — procurement frameworks, panel arrangements, and multi-year contracts give large buyers substantial negotiating leverage on price. In the SME segment, buyers are too fragmented and under-informed to exercise collective power, which creates a different opportunity: higher-margin, lower-complexity managed services to buyers who cannot or will not negotiate hard.

New entrants face a credibility barrier that is higher than it appears. Essential Eight compliance certification, ASD panel inclusion, and government security clearances for staff are not achievable quickly. This creates durable protection for established vendors in the government segment. Cloud-native security startups — particularly those built on AI-native detection — can enter the commercial enterprise segment without those barriers, which is where most international entrants start.

9. Segment Dynamics

XDR, identity, and cloud security are the three product categories where Australian spend is growing fastest.

These are not trend labels — they are the specific capability gaps that compliance frameworks are forcing organisations to fill.

Extended Detection and Response is the category Gartner identifies as a priority investment area for Australian organisations in 2025–2026.[Gartner] XDR platforms consolidate endpoint, network, and cloud telemetry into a single detection and response layer — exactly the capability that organisations with small security teams need when they cannot hire analysts at the rate threats are growing. The 76% of Australian organisations that IDC reports have experienced doubled threat volumes are the natural XDR buyer base: too much signal, not enough people to interpret it.[IDC]

Identity and Access Management is the compliance category with the clearest procurement mandate. Essential Eight controls — multi-factor authentication, privileged access management — map directly to IAM product categories. APRA CPS 230 requires demonstrable control over who can access what systems. Every government entity working toward Essential Eight maturity is effectively an IAM procurement event. This is not a nice-to-have segment — it is the entry point for compliance-driven purchasing across both government and financial services.[Home Affairs]

Australian Cybersecurity Product Segments — Growth and Demand Assessment
Scored across growth rate, regulatory pull, and talent-substitution potential, 2025–2026
Growth Rate Regulatory Pull Talent-Substitution Value
Extended Detection & Response (XDR) AI-native opportunity
Identity & Access Management (IAM) Essential Eight mandated
Cloud Security Sovereignty premium
Managed Security Services (MSSP) SME addressable
Security Information & Event Management (SIEM) Compliance logging
Operational Technology (OT) Security SOCI-driven

Cloud security is growing with Australian cloud adoption, which Gartner projects at AUD $60 billion in total cloud spending in 2026 — up 13.6% year on year.[Gartner] As workloads move to cloud, perimeter security models become inadequate and cloud-native security tooling becomes necessary. Data sovereignty requirements — particularly for government — add a layer of complexity that favours vendors with Australian data centre presence or certified sovereign cloud partnerships. This is a segment where local regulatory knowledge provides genuine product differentiation.

10. Outlook

The base case is sustained growth above 9% — but a regulatory stall or a major vendor trust failure could shift that materially.

This is not a market that turns on macro conditions. It turns on breach events and regulatory momentum.

The base case reflects what the current trajectory — Gartner's 9.5% growth, accelerating software spend, active regulatory consultation — points to absent any major disruption. The regulatory pipeline is real and active: SOCI amendments are in consultation now, CPS 230 is live, and Horizon 2 of the Cyber Security Strategy adds further compliance obligations. None of these are proposed legislation that might not pass. They are executive and regulatory actions that are already changing procurement behaviour.

Three Scenarios for the Australian Cybersecurity Market Through 2028
Based on regulatory trajectory, threat environment, and consolidation dynamics
bull
Regulation accelerates — breach forces emergency action
25
  • Major attack on Australian energy or water infrastructure triggers emergency SOCI legislation
  • Vendor-risk direction powers enacted in final form, forcing critical infrastructure procurement overhaul
  • Federal budget emergency cyber allocation above AUD $1B
  • Market grows at 15%+ annually through 2028
base
Sustained 9–12% growth driven by compliance and AI threat escalation
60
  • Gartner's 9.5% 2026 growth rate sustained through 2028
  • SOCI amendments enacted broadly as consulted — moderate vendor disruption
  • XDR and IAM categories continue outpacing services growth
  • Accenture-CyberCX integration succeeds; one or two further mid-market M&A deals
bear
Procurement friction and a vendor trust failure slow growth to 5–7%
15
  • Federal budget compression delays non-mandatory government procurement
  • Major vendor outage (CrowdStrike-scale or larger) triggers market-wide evaluation pause
  • SOCI amendment process extends into 2027 — compliance obligation uncertainty freezes discretionary spend
  • AUD depreciation increases cost of USD-priced global vendor software

The bull case requires two things to coincide: a major breach or attack on Australian critical infrastructure that triggers emergency legislative action, and the passage of the proposed vendor-risk direction powers in final form. Either one accelerates mandatory spending. Both together — as happened in the US after SolarWinds and Colonial Pipeline — could produce a step change in government procurement volume that would push growth well above the base case trajectory.

The bear case is not a demand collapse — there is no realistic scenario where Australian organisations stop buying cybersecurity. The bear case is a growth slowdown driven by procurement friction: long government tender cycles that delay contract execution, budget pressure forcing organisations to defer non-mandatory purchases, or a vendor trust failure (like the CrowdStrike July 2024 outage on a larger scale) that forces a market-wide pause for evaluation. The floor of demand is set by compliance mandates. The ceiling is set by how fast regulation adds new obligations.

Intelligence Brief

Intelligence Brief

1.
The proposed SOCI vendor-risk direction power is the most commercially significant regulatory development in Australian cybersecurity — and it is not yet law. If enacted as consulted in April 2026, the vendor-risk direction power would allow the Australian government to direct critical infrastructure operators to stop using specific vendors — creating a compliance-driven vendor selection constraint unlike anything previously in the market, and a new category of commercial risk for any global vendor with sovereign exposure concerns.
2.
Accenture's acquisition of CyberCX removed the most credible exit path for the remaining local managed security players. CyberCX was the largest independent Australian cybersecurity services firm — its acquisition by Accenture means the remaining local MSSPs either sell to a second-tier global buyer or compete against a firm with Accenture's balance sheet and government relationships, without an equivalent exit multiple on the table.
3.
Security software is growing at 12.3% — nearly twice the rate of services — and this gap will widen as AI-native platforms replace managed service headcount. Gartner's 2026 forecast shows services at 6.9% growth and software at 12.3%; the talent shortage makes this structural rather than cyclical, because organisations cannot hire analysts fast enough to match threat volumes and software is the only scalable alternative.
4.
76% of Australian organisations have already experienced a doubling of threat volume from AI-powered attacks — but vendor roadmaps are lagging the threat. IDC's data shows the majority of the Australian market is already under elevated AI-threat conditions; the demand for AI-native detection and response is not a future need, it is a present pain point with no adequate current supply.
5.
No single vendor holds a publicly disclosed Australian market share figure — this market is fragmented and the consolidation phase is early. Mordor Intelligence names CrowdStrike, Palo Alto Networks, Cisco, CyberArk, and Accenture as market leaders without attaching Australian share figures to any of them — the absence of concentration data is itself evidence that the fragmentation opportunity is real and the consolidator premium is available.
6.
Essential Eight certification functions as a market access barrier — not a differentiator — and vendors without it cannot compete for federal contracts. ASD's Essential Eight maturity model is the de facto procurement filter across federal and state government; the cost and time required to achieve compliance creates a durable moat for certified vendors and a structural barrier to new entrants targeting the public sector.
7.
The AUD $587M government strategy commitment converts into procurement demand — not equity investment — and that distinction matters for how the market prices growth. Government funding for the 2023–2030 strategy flows to ASD capability uplift and critical infrastructure grants, not to commercial vendors as capital; the demand effect is real but indirect, through contracts and compliance obligations rather than direct investment.
8.
Operational technology security is the most under-served segment relative to its regulatory exposure. SOCI Act obligations cover energy, water, transport, and health — all of which run operational technology environments with legacy security postures — but OT security vendor coverage is sparse in the Australian market, and no verified OT-specific spend figure exists for Australia.
Sources & Methodology

Research conducted 14 Apr 2026. All statistics carry inline citation markers.

Tier 1 — Primary sources
Gartner Australian Information Security Spending Forecast 2026 · Gartner · 2025 · Market forecast · Market size, segment breakdown, growth rates — market-size, market-structure, segment-growth sections
ASD Annual Cyber Threat Report 2024–2025 · Australian Signals Directorate · 2025 · Government regulatory report · Threat volume data, incident statistics, compliance context — demand-drivers, competitive-forces, market-structure sections
2023–2030 Australian Cyber Security Strategy · Department of Home Affairs · November 2023 · Government strategy document · Regulatory environment, demand drivers, capital flows, buyer landscape sections
Department of Home Affairs SOCI Act Amendments Consultation Paper · Department of Home Affairs · April 2026 · Government consultation document · Regulatory environment and scenarios sections
Department of Home Affairs Corporate Plan 2025–26 · Department of Home Affairs · 2025 · Government corporate plan · Buyer landscape and regulatory context
ASD Cyber Security Priorities for Boards of Directors 2025–26 · Australian Signals Directorate · 2025 · Government guidance · Buyer landscape and segment-growth sections
Tier 2 — Supporting sources
Australia Cybersecurity Market Report · Mordor Intelligence · 2026 · Industry research report · Market size (alternate estimate), competitive landscape, named players
Cybersecurity Software and Services Australia — Industry Report · IBISWorld · 2025 · Industry research report · Narrow market size estimate, buyer segmentation
Accenture Press Release: Accenture to Acquire CyberCX · Accenture · 2025 · Corporate announcement · Competitive landscape and capital flows sections
Tier 3 — Additional sources
Top 5 Cybersecurity Companies in Australia 2026 · Borderless CS · 2026 · Company blog / self-promotion · Referenced only to note absence of verifiable data; not used as evidence
Conflicting sources

Total Australian cybersecurity market size 2026 — Gartner: AUD $7.5B in information security spending vs Mordor Intelligence: USD $10.04B (approximately AUD $15.6B) using broader scope definition. Gartner used as primary figure. Gartner is a Tier 1 source with a more granular segment breakdown. The Mordor figure likely includes hardware, network infrastructure, and OT security outside Gartner's scope. Both directionally consistent on growth trajectory.

Cybersecurity software/services CAGR — IBISWorld: 2.2% CAGR for cybersecurity software services (narrow definition, 2020–2025) vs Mordor Intelligence: 13.58% CAGR to 2031 (broad market definition). IBISWorld and Mordor are not in conflict — they measure different things. IBISWorld's narrow software-services-only definition produces a lower CAGR. Mordor's broad market definition includes more categories. Both cited with scope noted.

Data gaps

No vendor-level Australian market share figures are publicly available for any player — global or local. Confidence on competitive position capped at MEDIUM. Analyst coverage of this market does not extend to share estimates.

No named venture capital or private equity deals in Australian cybersecurity between 2023 and 2026 appear in any Tier 1 or Tier 2 source. Capital flows section rated LOW confidence. The absence may reflect sub-disclosure-threshold deal sizes or a genuine gap in domestic VC activity.

No sector-specific budget figures for government or healthcare cybersecurity procurement are publicly available. Buyer landscape section relies on qualitative evidence of demand intensity rather than verified spend figures.

No Australian vendor-level gross margin, pricing model, or cost structure data is publicly available. The economics section of this report was not written — the data required to do so responsibly does not exist in public sources.

Fewer than 2 Tier 1 sources address IDC's AI threat volume data — the IDC figure (76% of organisations reporting doubled threat volume) is cited in secondary sources and should be treated as MEDIUM confidence.

This report is produced for informational purposes only. It does not constitute financial, legal, or investment advice. All data is sourced from publicly available information as at the date of research. Renatus Ventures makes no representations as to the completeness or accuracy of third-party data.

Create a free account
Register to download and share this report — it only takes a moment.
Register