Tech/Engineering

Constant Vigilance Starts at the Top: Executive Insights from the M&S Ransomware Attack

Yogesh Badwe , Chief Security Officer

The recent ransomware incident involving UK retailer Marks & Spencer (M&S) has brought renewed urgency to the conversation around cybersecurity preparedness, especially with early signals that US retailers may be targeted next. While full details continue to emerge, early reports indicate a sophisticated intrusion that disrupted operations and exposed sensitive data.

But this is not just a story of one company’s experience—it’s a reflection of the dynamic threat landscape that every business faces today. The scale and complexity of the attack signal a growing trend: threat actors are targeting not only infrastructure but also the business ecosystems around them, including employees, vendors, and customer-facing systems.

For executive leaders, this moment serves as a call to revisit and reinforce cyber resilience strategies—not out of fear, but out of foresight. Security is no longer just a technical problem but can have meaningful bottom line impact.

1. Clarify What’s Critical—And Keep It Visible

Every organization has assets that, if compromised, could halt operations or erode public trust. The challenge is that these “crown jewels” aren’t always the most obvious systems. In many cases, attackers gain access through overlooked pathways—support systems, identity infrastructure, or trusted partners.

The incident affecting M&S is a powerful reminder that understanding the full chain of risk is vital. This includes the business functions that support critical operations, as well as the third-party systems and teams that enable them.

Leadership considerations:

  • Support frequent reviews of critical data, applications, and infrastructure—including dependencies beyond IT and your 3rd party vendors and contractors.

  • Ensure that cyber risks are assessed, quantified and regularly discussed in enterprise risk forums.

  • Encourage ongoing collaboration between business, IT, and security teams to map evolving exposure.

2. Invest in Human-First Security Practices

Technical defenses are essential, but people remain the most frequently targeted—and often most vulnerable—entry point. From phishing to impersonation tactics, threat actors are increasingly leaning on social engineering as a way in. This problem is now exacerbated due to Generative AI with DeepFakes and easily crafted phishing lures.

Though specifics of the M&S breach are still being investigated, reporting suggests that attackers may have relied on manipulation rather than malware alone to gain a foothold. This reinforces the need to integrate people-centric protections into the security stack.

Leadership considerations:

  • Back sustained investments in employee security awareness—not just annual training, but real-world simulations and reinforcement.

  • Ensure that controls like phishing resistant multi-factor authentication and least-privilege access extend to all teams, including support roles.

  • Reinforce the principle that security is everyone’s job, and create space for teams to raise concerns proactively.

3. Ask the Right Questions About Detection

In many high-impact incidents, attackers spend days, weeks, or even months inside systems before launching ransomware or stealing data. That dwell time represents an opportunity—for those watching closely.

Executive teams don’t need to be hands-on with detection tools, but they do need to sponsor and engage with the right conversations. What’s the average time to detect a threat? How quickly can we respond once it’s discovered? Are we staffed or partnered to watch for issues around the clock? What is our detection coverage across the MITRE ATT&CK framework?

Leadership considerations:

  • Make detection and response metrics—like MTTD and MTTR—part of regular reporting, including at the Board level.

  • Confirm that your organization has continuous threat monitoring, either in-house or via a managed service.

  • Ensure threat intelligence is integrated into operational processes, not siloed as a static feed.

4. Rehearse Incident Response Before It’s Needed

Cyber incidents rarely unfold in a straight line. When pressure is high, the ability to act quickly and cohesively can mean the difference between containment and escalation. That’s why practiced response plans matter so much.

M&S’s decision to take systems offline reportedly helped limit further damage. But such decisions don’t happen spontaneously—they require trust, alignment, and preparation at every level.

Leadership considerations:

  • Support the development and testing of incident response and crisis management plans that reflect real decision making scenarios.

  • Collaborate with external partners in advance so the organization is not negotiating support in the middle of a crisis.

  • Align with internal stakeholders on business-impact thresholds and response authority—so decisions can be made fast, not debated under pressure.

5. Lead the Recovery—and What Comes After

Post-incident recovery is more than just a return to service. It’s a chance to rebuild stronger, regain confidence, and reaffirm commitments to resilience. From regulators to customers, stakeholders want to see not only that an organization has responded—but that it is learning and evolving.

In the wake of the M&S breach, public attention has shifted toward what comes next: remediation, communication, and longer-term improvement. Those are outcomes that depend not just on technology, but on leadership.

Leadership considerations:

  • Insist on a structured, transparent post-incident review that identifies lessons learned across the organization.

  • Approve forward-looking investments to close gaps, rather than simply restoring prior states.

  • Communicate progress and improvement plans clearly to customers, employees, and partners.

A Moment for Leadership

The M&S ransomware attack has already sparked meaningful discussions across the industry—not because of who was targeted, but because of what it reveals about the interconnected nature of today’s digital risks.

This is not a moment to point fingers. It’s a moment to lean in.

Cybersecurity has become a core leadership discipline. As threats evolve, so must the questions we ask, the investments we prioritize, and the culture we shape. 

At Druva, we’ve seen that the most resilient organizations aren’t the ones with the biggest security budgets—they’re the ones where leadership is engaged, collaborative, and committed to constant vigilance.

Time to Take Action

Instantly measure your cyber resilience maturity level. Get to your security blind spots before bad actors do. Built on real customer insights, our 5-level maturity model is a roadmap to level up your cyber resilience and shut down risks. Ditch the guesswork and find out exactly where you stand—your data’s counting on you.

Looking to strengthen your executive playbook for cyber resilience? Our team is here to help. We’re working with leaders across industries to elevate preparedness and protect what matters most. Get started today.