This transcription is provided by artificial intelligence. We believe in technology but understand that even the smartest robots can sometimes get speech recognition wrong Hey everyone. I'm Drex and this is the two minute drill where I cover some of the hottest security stories twice a week. All part of the 2 29 project, cyber and Risk community here at this week. Health Sign Up. I'll keep you posted on all the latest webinars and podcast and insider info. It's easy to stay in the know.
Go to this week, health.com/subscribe and sign up for all the latest, including of course, our security and risk updates. Great to see everyone today. Here's some stuff you might wanna know about. This story caught my attention over the weekend, and I love it, even though it'll probably make a lot of exec squirm.
Qantas, Australia's biggest airline, they had $1.5 billion in profits last year. They just announced that all of their senior executives are taking a 15% cut to their bonuses this year. Uh, why would Qantas do that? You might ask. Well, in July there was a data breach at Qantas. 5.7 million customers had their data compromised.
Name, address, email, airline status. Phone numbers, date of birth, you get it. And in this case, Qantas has decided that the whole executive suite will be sharing in the pain of that breach, not just the ciso, not just the CIO or the IT team. Everyone in the executive suite, they're gonna take a hit. The logic to me is really simple.
Cybersecurity isn't just a technology issue. It's truly a team sport. It's a business risk, and if you're a leader in the company, you own it and your wallet should reflect that failure. Now, just imagine this happening in healthcare. What if your CEO and CFO and Chief Operating Officer, and Chief Chief Nursing Officer, and Chief Medical Officer, what if they all had skin in the game?
When it came to security, would budgets for cybersecurity programs suddenly look different? Would execs be quicker to approve those investments in patch management or incident response planning, or third party risk assessments? Would department leaders lean into the idea of building business continuity plans where they lean into bigger investments and more robust security and resilience exercises?
Is there a CEO out there who'd like to sit down and have a conversation with me about how they're building a program that would put every exec's wallet on the table when there's a cyber incident? If so, I would love to talk to you. Qantas. Just put down a really bold marker, and I know before you say it, I, I thought the same thing.
Initially, those execs probably make millions of dollars in their bonus, millions of dollars, and so they won't feel the impact of a 15% cut maybe, but. Tying cyber performance to compensation at the executive level still has the possibility of making real accountability happen at that executive level.
And for healthcare, it's a really provocative idea, given the stakes of a breach from patient safety to operational disruption. I maybe it's a conversation worth having. I think we should try. We on this story and a lot of other healthcare innovation, tech and security news. Check out this week, health.com/news and you can find all my security podcast, including the ones you might've missed at this week, health.com/unh hack.
That's it for today's two minute drill. Thanks for being here. Stay a little paranoid and I'll see you around campus.