Australian Cybersecurity Market Structure and Growth Dynamics
Market Intelligence
Australian organisations will spend AUD $7.5 billion on information security in 2026 — a 9.5% increase on the prior year — with security services alone accounting for AUD $3.7 billion of that total.[Gartner] The market is not being driven by discretionary IT spending cycles. It is being driven by breach pain: Optus, Medibank, and a string of follow-on incidents have made cybersecurity a board-level obligation, not a technology team decision. The Australian Signals Directorate received 87,400 cybercrime reports in FY2024–25, and its Cyber Security Hotline fielded 42,500 calls — up 16% year on year.[ASD]
The structural tension in this market is the gap between the scale of regulation being layered on and the pace at which vendors can credibly serve it. The 2023–2030 Cyber Security Strategy, the Security of Critical Infrastructure Act amendments under active consultation in April 2026, and APRA's CPS 230 operational resilience standard are creating compliance-driven purchasing that bypasses normal budget cycles. Critical infrastructure operators — energy, transport, health, financial services — now face enforceable ministerial directions for risk management, with new vendor-risk direction powers proposed that would let government intervene directly in which technology products those operators can use.[Home Affairs] Global vendors including CrowdStrike and Palo Alto Networks are named in the market but hold no publicly disclosed Australian market share. The absence of a dominant local player, combined with Accenture's acquisition of CyberCX announced in 2025, signals that consolidation is accelerating before any one player has locked in the market.
A AUD $7.5 billion market in 2026 — and the software segment is growing at twice the rate of services.
Gartner's figure is the most reliable single number in this market — and it tells a story about where the money is moving.
Gartner forecasts total Australian information security spending at AUD $7.5 billion in 2026, up 9.5% from 2025.[Gartner] Security services — managed security, consulting, and professional services — account for AUD $3.7 billion and are the single largest category, growing at 6.9%. Security software accounts for AUD $3.3 billion and is growing faster, at 12.3%, driven by demand for Extended Detection and Response platforms, Identity and Access Management tools, and AI-enabled compliance software.[Gartner]
A separate estimate from Mordor Intelligence puts the Australian cybersecurity market at USD $10.04 billion (approximately AUD $15.6 billion at mid-2026 exchange rates) growing at a 13.58% CAGR to reach USD $18.98 billion by 2031.[Mordor] The gap between Gartner and Mordor Intelligence is significant — likely explained by differing scope definitions, with Mordor including hardware, network security infrastructure, and operational technology security that Gartner may classify separately. This report uses the Gartner figure for 2026 spending as it is the most detailed Tier 1 estimate available, but the Mordor trajectory is consistent with the direction of travel.
IBISWorld estimates the narrower cybersecurity software and services segment — excluding hardware and network infrastructure — at AUD $2.1 billion in 2026, growing at a 2.2% CAGR from 2020–2025.[IBISWorld] The low CAGR from IBISWorld likely reflects their narrower definition of software services only. The Gartner total is the most comprehensive and reliable benchmark for market sizing purposes.
Breach pain and regulatory obligation are driving demand that no budget cycle can switch off.
The Optus and Medibank breaches did not just damage those companies — they changed how every Australian board thinks about cyber risk.
The Australian Signals Directorate recorded 87,400 cybercrime reports in FY2024–25, with its Cyber Security Hotline fielding 42,500 calls — a 16% increase year on year.[ASD] Ransomware attacks rose 36% over the same period. Zero-day exploits used in attacks increased 46% in 2024–2025.[ASD] These are not abstract threat statistics. They are the operational context in which Australian CISOs are building budgets and boards are approving them.
AI-powered attacks are accelerating the threat environment faster than most vendor roadmaps can match. IDC data shows 76% of Australian organisations reported at least a twofold increase in threat volume, and 51% had already been materially affected by AI-powered attacks.[IDC] This is creating demand for detection and response capabilities that did not exist as product categories three years ago — specifically Extended Detection and Response platforms and AI-native security operations tooling.
The compliance layer sits on top of the threat layer and amplifies it. The 2023–2030 Cyber Security Strategy's first horizon (2023–2025) mandated foundational controls across critical infrastructure. Horizon 2, under consultation through July–August 2025, adds Zero Trust adoption requirements.[Home Affairs] APRA's CPS 230 operational resilience standard adds a further purchasing mandate for financial services firms. The result is that cybersecurity has moved from a discretionary IT spend line to an auditable compliance obligation for the largest buyers in the market.
Three overlapping regulatory frameworks are converting cybersecurity from a preference into an obligation — and one of them can now dictate which vendors you use.
The proposed vendor-risk direction power under the SOCI Act amendments is the most commercially significant regulatory development in this market.
The 2023–2030 Cyber Security Strategy, released 22 November 2023, is structured across six shields and three horizons. Horizon 1 (2023–2025) focused on foundational controls — patching, access management, threat sharing. Horizon 2, currently under consultation, adds Zero Trust architecture as a compliance requirement and expands public-private threat intelligence sharing obligations.[Home Affairs] Every horizon adds new product categories to the compliance checklist.
The Security of Critical Infrastructure Act 2018 amendments are the regulatory development with the sharpest commercial teeth. An independent review completed in January 2026 by Jill Slay recommended refinements for interconnected supply chain risks. The April 2026 consultation proposes a graduated ministerial direction framework — and critically, a new vendor-risk direction power that would allow the government to direct critical infrastructure operators to stop using specific vendors or products.[Home Affairs] If enacted, this creates a compliance-driven vendor selection constraint unlike anything previously in the market. Operators in energy, transport, water, and health would need to demonstrate ongoing vendor compliance — not just at procurement, but continuously.
Six shields covering citizen resilience, safe technology, threat sharing, critical infrastructure protection, sovereign capability, and global leadership. Horizon 2 adds Zero Trust requirements.
Proposed vendor-risk direction power allows government to direct critical infrastructure operators away from specific vendors or products deemed systemic risks.
Requires APRA-regulated entities to demonstrate operational resilience and third-party risk management, including cybersecurity incident recovery within defined timeframes.
Eight baseline controls functioning as a procurement filter for government contracts. Vendors must demonstrate alignment; government entities must demonstrate maturity levels.
APRA's CPS 230, operative from 1 July 2025, requires all APRA-regulated entities — banks, insurers, superannuation funds — to maintain operational resilience, including mapping third-party service provider risk and demonstrating incident recovery capability within defined timeframes. This has driven a wave of identity and access management procurement and managed detection and response contracts in the financial sector. The ASD Annual Cyber Threat Report confirmed 11% of ASD-assisted incidents in FY2023–24 involved critical infrastructure, providing the empirical basis for both the SOCI reforms and the CPS 230 obligations.[ASD]
Government and financial services are buying under compliance mandates — healthcare is buying in response to breach trauma.
The Medibank breach in 2022 did more to open the healthcare cybersecurity market than any vendor sales effort.
The four largest buyer segments in the Australian cybersecurity market are federal and state government, financial services, healthcare, and critical infrastructure operators. Each is buying for a different underlying reason, which matters for vendors trying to position product and services.[IBISWorld] Government procurement is filtered through the Essential Eight maturity model and, for federal entities, the ASD's panel frameworks. A vendor that cannot demonstrate Essential Eight alignment cannot win a federal contract — full stop. This makes compliance certification a market-entry requirement, not a differentiator.
Financial services firms are buying under two simultaneous mandates: APRA's CPS 230 operational resilience standard (operative from July 2025) and, for systemically important institutions, SOCI Act obligations. The combination is driving Identity and Access Management and managed detection and response procurement at volume. Sydney and Melbourne, as the centres of Australia's financial services industry, account for a disproportionate share of enterprise-grade cybersecurity services demand.[IBISWorld]
Healthcare is the fastest-growing demand segment by buyer anxiety, if not yet by absolute spend. The Medibank breach exposed 9.7 million patient records and triggered regulatory scrutiny that has not abated. Healthcare CISOs now operate under breach-awareness conditions that did not exist before 2022 — and without the same level of existing security infrastructure that banks have built over decades. This creates an addressable market where buyers need foundational tooling, not advanced capabilities, which favours managed security service providers over pure-play software vendors. No verified sector-level budget figures are publicly available for healthcare cybersecurity specifically — this gap limits confidence in sizing that segment precisely.
No vendor has locked in the Australian market — and Accenture's acquisition of CyberCX signals that the consolidation phase has begun.
When a firm the size of Accenture pays to acquire the largest independent Australian cybersecurity player, it is telling you something about the market's trajectory.
The competitive landscape in Australian cybersecurity is dominated by global vendors — CrowdStrike, Palo Alto Networks, Cisco, Check Point, CyberArk — operating alongside large systems integrators like Accenture and IBM, and a layer of locally headquartered managed security service providers.[Mordor] No vendor holds a publicly disclosed Australian market share figure. This is an important data absence: it tells you that no single player has achieved the kind of dominance that generates analyst tracking. The market is genuinely fragmented.
Accenture's 2025 acquisition of CyberCX — described in the Accenture announcement as expanding cybersecurity capabilities across Asia-Pacific — is the most consequential competitive move in the market in recent years.[Accenture] CyberCX was the largest independent Australian cybersecurity services firm, with operations spanning managed security, incident response, and government advisory. Accenture's acquisition does two things at once: it removes the most credible local challenger from independent competition and it gives a global systems integrator local market depth and existing government relationships. For every other player in the managed security space, this changes the competitive calculus.
Global software vendors — CrowdStrike and Palo Alto Networks in particular — are named by Mordor Intelligence as market leaders but without Australian-specific revenue or share data.[Mordor] Their dominance in endpoint protection and network security globally does not automatically translate to Australian market share, where government procurement rules, data sovereignty requirements, and Essential Eight alignment affect vendor selection in ways that are different from other markets. Local MSSPs like Macquarie Technology, Borderless CS, and Sekuro are mentioned in third-tier sources but without verifiable revenue or contract data — this report does not assign those claims weight.
Services revenue dominates today — but software is where the margin and the growth are concentrated.
A market where services are larger than software is a market still in the deployment phase. That changes as platforms mature.
Security services account for 49% of total Australian information security spending in 2026 — managed security, consulting, and professional services.[Gartner] This is characteristic of a market where organisations lack internal capability and are outsourcing to providers. Security software accounts for 44% and is the fastest-growing category. The remaining 7% sits across network security equipment and other hardware-adjacent spend. The relative weighting of services over software is not unique to Australia — it reflects the global pattern in markets where the regulatory compliance burden is high and in-house expertise is scarce.
The 12.3% growth rate in security software versus 6.9% in services is the most important structural signal in the market.[Gartner] As organisations mature their security posture — particularly under Essential Eight compliance requirements — they shift from buying managed services to buying software that automates what the managed service was providing. This is the standard arc of enterprise software adoption, and it compresses margins for MSSPs while expanding them for software platform vendors. The vendors best positioned for this transition are those whose software is already embedded in compliance workflows — identity management, endpoint protection, and SIEM platforms.
The talent shortage accelerates this dynamic. Australia faces a documented cybersecurity skills gap — ASD's own workforce development initiatives acknowledge the shortfall — which means organisations cannot hire their way out of capability gaps.[ASD] Software that replaces headcount is not optional; it is structural. This creates durable demand for automation-heavy security platforms, particularly AI-native detection and response tools, that is unlikely to reverse as long as the talent market remains constrained.
M&A is the defining capital story — not venture funding — and Accenture's move sets the price of market access.
Global consolidation in cybersecurity is running at USD $100 billion in 2025 — and Australia is not insulated from that.
Named venture capital or private equity deals specifically targeting Australian cybersecurity companies between 2023 and 2026 are not documented in any available public source. This absence is a finding: the Australian cybersecurity investment landscape at the venture stage is either not generating deals of sufficient scale to attract analyst tracking, or those deals are not being publicly disclosed at a level that would generate Tier 1 or Tier 2 coverage. No confidence can be placed in any specific deal number or fund name without that documentation.
The global M&A picture is clear, even if the Australian picture is not. Global cybersecurity M&A in 2025 reached approximately USD $100 billion, with 92% deployed by strategic acquirers and 8% by private equity.[Accenture] Strategic acquirers — technology companies and professional services firms — are using M&A to buy market position, customer relationships, and talent rather than building organically. Accenture's acquisition of CyberCX fits exactly that pattern. The implication for Australian market participants is that the most likely exit for a locally scaled cybersecurity firm is acquisition by a global strategic, not a public market listing or PE buyout.
The Australian government has committed AUD $587 million to the 2023–2030 Cyber Security Strategy, with AUD $143 million allocated in the first horizon (2023–2025) to foundational measures including ASD capability uplift and critical infrastructure protection.[Home Affairs] Government investment does not flow directly to vendors as investment capital, but it does create procurement demand that de-risks private investment in the sector. Public sector contracts provide the revenue predictability that makes an Australian cybersecurity firm a credible acquisition target.
Regulatory barriers and buyer concentration give incumbents more protection than a fragmented market usually provides.
Essential Eight certification is not a checklist — it is a moat. Vendors who have it can charge for it.
Supplier power in this market sits primarily with the global software platform vendors — CrowdStrike, Palo Alto Networks, Microsoft, and Cisco — who set the underlying technology stack that most Australian managed security providers resell or integrate. A local MSSP that has built its service delivery on a single global platform has limited negotiating leverage with that vendor. This creates margin pressure at the MSSP layer that the platform vendors do not share.
Buyer power is significant in the enterprise and government segments — procurement frameworks, panel arrangements, and multi-year contracts give large buyers substantial negotiating leverage on price. In the SME segment, buyers are too fragmented and under-informed to exercise collective power, which creates a different opportunity: higher-margin, lower-complexity managed services to buyers who cannot or will not negotiate hard.
New entrants face a credibility barrier that is higher than it appears. Essential Eight compliance certification, ASD panel inclusion, and government security clearances for staff are not achievable quickly. This creates durable protection for established vendors in the government segment. Cloud-native security startups — particularly those built on AI-native detection — can enter the commercial enterprise segment without those barriers, which is where most international entrants start.
XDR, identity, and cloud security are the three product categories where Australian spend is growing fastest.
These are not trend labels — they are the specific capability gaps that compliance frameworks are forcing organisations to fill.
Extended Detection and Response is the category Gartner identifies as a priority investment area for Australian organisations in 2025–2026.[Gartner] XDR platforms consolidate endpoint, network, and cloud telemetry into a single detection and response layer — exactly the capability that organisations with small security teams need when they cannot hire analysts at the rate threats are growing. The 76% of Australian organisations that IDC reports have experienced doubled threat volumes are the natural XDR buyer base: too much signal, not enough people to interpret it.[IDC]
Identity and Access Management is the compliance category with the clearest procurement mandate. Essential Eight controls — multi-factor authentication, privileged access management — map directly to IAM product categories. APRA CPS 230 requires demonstrable control over who can access what systems. Every government entity working toward Essential Eight maturity is effectively an IAM procurement event. This is not a nice-to-have segment — it is the entry point for compliance-driven purchasing across both government and financial services.[Home Affairs]
| Growth Rate | Regulatory Pull | Talent-Substitution Value | |
|---|---|---|---|
| Extended Detection & Response (XDR) | AI-native opportunity |
|
|
| Identity & Access Management (IAM) | Essential Eight mandated |
|
|
| Cloud Security | Sovereignty premium |
|
|
| Managed Security Services (MSSP) | SME addressable |
|
|
| Security Information & Event Management (SIEM) | Compliance logging |
|
|
| Operational Technology (OT) Security | SOCI-driven |
|
|
Cloud security is growing with Australian cloud adoption, which Gartner projects at AUD $60 billion in total cloud spending in 2026 — up 13.6% year on year.[Gartner] As workloads move to cloud, perimeter security models become inadequate and cloud-native security tooling becomes necessary. Data sovereignty requirements — particularly for government — add a layer of complexity that favours vendors with Australian data centre presence or certified sovereign cloud partnerships. This is a segment where local regulatory knowledge provides genuine product differentiation.
The base case is sustained growth above 9% — but a regulatory stall or a major vendor trust failure could shift that materially.
This is not a market that turns on macro conditions. It turns on breach events and regulatory momentum.
The base case reflects what the current trajectory — Gartner's 9.5% growth, accelerating software spend, active regulatory consultation — points to absent any major disruption. The regulatory pipeline is real and active: SOCI amendments are in consultation now, CPS 230 is live, and Horizon 2 of the Cyber Security Strategy adds further compliance obligations. None of these are proposed legislation that might not pass. They are executive and regulatory actions that are already changing procurement behaviour.
- Major attack on Australian energy or water infrastructure triggers emergency SOCI legislation
- Vendor-risk direction powers enacted in final form, forcing critical infrastructure procurement overhaul
- Federal budget emergency cyber allocation above AUD $1B
- Market grows at 15%+ annually through 2028
- Gartner's 9.5% 2026 growth rate sustained through 2028
- SOCI amendments enacted broadly as consulted — moderate vendor disruption
- XDR and IAM categories continue outpacing services growth
- Accenture-CyberCX integration succeeds; one or two further mid-market M&A deals
- Federal budget compression delays non-mandatory government procurement
- Major vendor outage (CrowdStrike-scale or larger) triggers market-wide evaluation pause
- SOCI amendment process extends into 2027 — compliance obligation uncertainty freezes discretionary spend
- AUD depreciation increases cost of USD-priced global vendor software
The bull case requires two things to coincide: a major breach or attack on Australian critical infrastructure that triggers emergency legislative action, and the passage of the proposed vendor-risk direction powers in final form. Either one accelerates mandatory spending. Both together — as happened in the US after SolarWinds and Colonial Pipeline — could produce a step change in government procurement volume that would push growth well above the base case trajectory.
The bear case is not a demand collapse — there is no realistic scenario where Australian organisations stop buying cybersecurity. The bear case is a growth slowdown driven by procurement friction: long government tender cycles that delay contract execution, budget pressure forcing organisations to defer non-mandatory purchases, or a vendor trust failure (like the CrowdStrike July 2024 outage on a larger scale) that forces a market-wide pause for evaluation. The floor of demand is set by compliance mandates. The ceiling is set by how fast regulation adds new obligations.
Intelligence Brief
Research conducted 14 Apr 2026. All statistics carry inline citation markers.
Total Australian cybersecurity market size 2026 — Gartner: AUD $7.5B in information security spending vs Mordor Intelligence: USD $10.04B (approximately AUD $15.6B) using broader scope definition. Gartner used as primary figure. Gartner is a Tier 1 source with a more granular segment breakdown. The Mordor figure likely includes hardware, network infrastructure, and OT security outside Gartner's scope. Both directionally consistent on growth trajectory.
Cybersecurity software/services CAGR — IBISWorld: 2.2% CAGR for cybersecurity software services (narrow definition, 2020–2025) vs Mordor Intelligence: 13.58% CAGR to 2031 (broad market definition). IBISWorld and Mordor are not in conflict — they measure different things. IBISWorld's narrow software-services-only definition produces a lower CAGR. Mordor's broad market definition includes more categories. Both cited with scope noted.
No vendor-level Australian market share figures are publicly available for any player — global or local. Confidence on competitive position capped at MEDIUM. Analyst coverage of this market does not extend to share estimates.
No named venture capital or private equity deals in Australian cybersecurity between 2023 and 2026 appear in any Tier 1 or Tier 2 source. Capital flows section rated LOW confidence. The absence may reflect sub-disclosure-threshold deal sizes or a genuine gap in domestic VC activity.
No sector-specific budget figures for government or healthcare cybersecurity procurement are publicly available. Buyer landscape section relies on qualitative evidence of demand intensity rather than verified spend figures.
No Australian vendor-level gross margin, pricing model, or cost structure data is publicly available. The economics section of this report was not written — the data required to do so responsibly does not exist in public sources.
Fewer than 2 Tier 1 sources address IDC's AI threat volume data — the IDC figure (76% of organisations reporting doubled threat volume) is cited in secondary sources and should be treated as MEDIUM confidence.
This report is produced for informational purposes only. It does not constitute financial, legal, or investment advice. All data is sourced from publicly available information as at the date of research. Renatus Ventures makes no representations as to the completeness or accuracy of third-party data.
Welcome to the new Renatus
Your reports from the previous platform are still accessible at legacy.renatus.icu