Beyond the Firewall - Why Integrated Risk Management Is the Missing Layer in Cyber Defense
The recent revelation that Marks & Spencer—one of Britain’s most iconic retailers—suffered a cyberattack that could cost it up to £300 million in annual operating profit is a reminder that no amount of cybersecurity spending can fully inoculate a company from human error. The attack, reportedly traced to a third-party vendor and facilitated by social engineering, underscores a hard truth: cybersecurity is necessary, but not sufficient.
Despite boosting its cyber investment by 75% and quadrupling its team over the past two years, M&S was not spared. Nor were other well-known retailers like Harrods and the Co-op grocery group. These incidents reflect a deeper problem in the digital defense playbook—one that requires a broader, integrated approach to risk.
The Human Layer: Still the Softest Target
Social engineering, once a term associated with propaganda and psychological influence, has taken on a new cyber-inflected meaning: manipulating people into enabling digital intrusions. These attacks are not brute-force hacks; they are precision-guided campaigns that exploit human trust, fatigue, or error. Whether it’s duping an IT helpdesk into resetting a password or hijacking SMS verification through SIM swaps, these tactics bypass technical controls by targeting the one variable that’s hardest to patch—us.
The FT’s editorial rightly emphasizes the growing threat of groups like “Scattered Spider,” who blend digital sophistication with interpersonal manipulation. Their victims are not just firewalls and data centers, but the people behind them—employees, contractors, and supply chain partners.
From Cybersecurity to Integrated Risk Management
What these breaches reveal is not just a failure of cybersecurity controls, but a failure of risk integration. While security teams may be fortified, other stakeholders—including procurement, vendor managers, legal counsel, and even HR—are often untrained and unaware of their role in digital resilience. That’s where Integrated Risk Management (IRM) comes in.
IRM goes beyond the silos of IT security to unify cyber, operational, third-party, compliance, and enterprise risk disciplines. It recognizes that digital vulnerabilities often originate in business processes—vendor onboarding, contract design, access provisioning, and incident response—and not just in code.
An IRM approach would:
Map risk across third-party ecosystems, not just monitor endpoints
Institutionalize board-level visibility, not just compliance checklists
Unify business continuity and cyber incident response, avoiding fragmented crisis playbooks
Continuously assess and adapt controls, rather than rely on static configurations or annual audits
Cyber insurance may offer some recovery cushion, but it rarely covers the reputational or shareholder damage that follows a well-publicized breach. Only an integrated model of risk management—where people, processes, and technology align—can close the gap between security readiness and business resilience.
Rethinking Risk Ownership
The M&S case reinforces a broader trend: cyber risk is no longer confined to IT departments. It is now a strategic risk, a reputational risk, a supply chain risk—and, increasingly, a boardroom risk. Yet too many organizations still treat these as separate domains. That segmentation is precisely what attackers exploit.
IRM offers a structural correction to this fragmentation. By connecting the dots across domains and elevating risk visibility to the highest levels of leadership, it not only hardens cyber defenses—it transforms them into a competitive differentiator.
Lesson Learned
The lesson from the latest wave of retail breaches is not that cybersecurity tools are broken, but that they are blind to broader systemic vulnerabilities unless paired with a more integrated approach. Firewalls and encryption are essential, but alone they cannot prevent a supplier’s employee from being duped or a contractor from clicking a rogue link.
In today’s asymmetric threat landscape, resilience requires more than cyber controls. It requires risk convergence.
The risk is integrated. The response should be too.
References
The Financial Times Editorial Board. “In cyber attacks, humans can be the weakest link.” FT View, May 26, 2025.
Google Threat Intelligence. Scattered Spider Threat Profile, 2024.
U.S. Department of Justice. “Five Alleged Members of Scattered Spider Charged.” DOJ Press Release, 2024.
Marks & Spencer Annual Report, 2024.