Fractional CISO working on laptop
Compliance

What CISOs Need to Know About The UK Cyber Security and Resilience Bill

29 April 202610 min read

For a piece of legislation first announced in the July 2024 King’s Speech, the progress of the Cyber Security and Resilience Bill has been steady rather than dramatic. But its implications for security leaders are substantial.

If you have not been tracking it closely, you are not alone. Most CISOs have been occupied with more immediate concerns: hostile cyber activity, supply chain breaches, and the constant pressure to demonstrate return on security investment. Yet this Bill will reshape the regulatory landscape for UK critical infrastructure, digital services, and their supply chains. Understanding its trajectory now saves expensive scrambling later.

Where the Bill Stands

Sponsored by DSIT, the bill is currently in the Commons at the Report stage.

Royal Assent is expected in late 2026. The government has been clear that implementation will be phased, with secondary legislation bringing specific obligations into force progressively through 2027 and 2028. Some provisions may take effect immediately upon Royal Assent. Most will not.

The timetable gives regulators and industry time to prepare. It also creates a dangerous temptation to defer action until dates are confirmed. That would be a mistake. The scope categories, reporting timelines, and penalty structures are already defined in the Bill. The broad direction of travel is, in all likelihood, fixed.

What is not yet fixed is the detail. Thresholds for specific sectors, exact security requirements, and Statutory Codes of Practice will all come through secondary legislation and regulator consultation. CISOs should be tracking those consultations now, not waiting for the final text. The Bill gives you the framework; the secondary legislation will give you the checklist.

What the Bill Actually Does

The Bill amends the Network and Information Systems Regulations 2018 rather than replacing them. It expands who falls under regulatory oversight, tightens reporting obligations, and gives regulators substantially stronger enforcement tools.

Expanded Scope

The most significant change is the broadening of regulated entities. The existing NIS regime covers Operators of Essential Services and Relevant Digital Service Providers. The Bill adds:

  • Managed Service Providers: Any organisation providing IT services, security operations, or cloud management to in-scope entities now faces direct regulation
  • Data centres: Colocation facilities above 1MW rated IT load, and enterprise data centres above 10MW
  • Large load controllers: Entities managing 300MW or more of electrical load
  • Designated Critical Suppliers: The Secretary of State can designate suppliers as critical even if they would not otherwise qualify, if their disruption could significantly affect essential or digital services
  • The last point deserves particular attention. It creates a flexible mechanism to capture supply chain dependencies that do not fit neatly into predefined categories. If you supply services to critical infrastructure operators, you could be brought into scope by designation even if your sector is not explicitly listed.

    Incident Reporting: The 24-Hour Clock

    The Bill introduces a two-stage reporting structure:

  • Within 24 hours: An early warning notification to both your sector regulator and the NCSC
  • Within 72 hours: A full incident report
  • This is tighter than the existing NIS framework and mirrors the NIS2 Directive’s timelines. Crucially, the Bill requires dual notification - both to the sector-specific competent authority and to the NCSC. Organisations accustomed to single-point reporting will need to update their playbooks.

    Customer notification is also required for data centres, RDSPs, and MSPs — they must take reasonable steps to identify and directly notify affected UK customers, explaining the incident and its likely impact. This is a direct obligation, not notification via the regulator. It creates a third communication thread alongside regulatory reporting, each with different content requirements and audiences.

    There is one major practical change that is easy to miss: the threshold for reporting has shifted. Under NIS 2018, you only reported incidents that had actually caused significant disruption. Under this Bill, the threshold is lower — you must report incidents that are capable of adversely affecting the IT systems on which your essential or digital services rely. Events that compromise security without yet causing disruption may now be reportable.

    There is a second unresolved problem: the Bill does not tightly define what counts as "significant" or "capable of adversely affecting." Those definitions will likely come through secondary legislation or regulator guidance, and they may differ by sector. Until they are published, every incident response playbook is built on an assumption. CISOs should engage with their sector regulator now to understand how the threshold is likely to be interpreted.

    The Penalty Regime

    The Bill replaces the existing flat penalty caps with a breach-type structure:

    Breach typeMaximum Penalty
    Standard breachGreater of £10 million or 2% of global annual turnover
    Higher breachGreater of £17 million or 4% of global annual turnover
    National security direction non-complianceGreater of £17 million or 10% of global annual turnover
    Continuing contraventionUp to £100,000 per day

    The 10% tier for national security direction failures is the most consequential change. A company with £500 million global revenue faces up to £50 million for non-compliance with a Secretary of State direction. These are not hypothetical figures; regulators are being given broader investigatory tools alongside the new penalty regime.

    Regulators also gain broader inspection powers, information-gathering authority, and the ability to recover costs from regulated entities.

    The CAF on Statutory Footing

    The NCSC Cyber Assessment Framework, previously guidance, gains stronger statutory recognition as the baseline for in-scope organisations. If you are not already familiar with the CAF’s four objectives - Manage Security Risk, Protect Against Cyber Attack, Detect Cyber Security Events, and Minimise the Impact of Cyber Security Incidents - now is the time to acquaint yourself.

    The Bill also creates powers for the Secretary of State to issue national security directions to specific entities, requiring particular actions or prohibiting certain practices where threats to national security are identified.

    It is worth noting that the Bill does not create personal director liability on its face. The penalties attach to organisations. But the CAF is an outcomes-based framework that embeds accountability at board level. Directors who treat cyber resilience as an IT matter rather than a governance responsibility will find they cannot credibly claim ignorance when a regulator comes calling. The direction of travel is clear: boards own this risk.

    Does This Actually Change Anything for CISOs?

    It depends.

    If You Are Already NIS-Regulated

    For existing Operators of Essential Services, the Bill tightens requirements you already know. The 24-hour reporting window is new. The dual notification obligation is new. The customer notification requirement is new. The penalty increases are new. But the fundamental architecture - sectoral regulation, security duties, incident reporting - is familiar.

    One complication for energy, water, and transport operators is operational technology. The Bill's critical national infrastructure focus means OT environments are squarely in scope. Applying 24-hour incident reporting and CAF controls to OT/ICS networks, where detection tooling is often immature and segmentation is physically constrained, is genuinely harder than in corporate IT. If your OT security programme lags your IT programme, that gap is now a regulatory exposure.

    Your preparation focus should be on:

  • Updating incident response playbooks for 24-hour initial notification
  • Establishing dual reporting workflows to both regulator and NCSC
  • Preparing customer communication templates for breach scenarios
  • Mapping current controls against the CAF to identify gaps
  • Reviewing cyber insurance coverage against the new penalty regime
  • If You Are a Managed Service Provider

    This is where the Bill bites hardest. MSPs previously operated outside direct NIS oversight. Now they fall within scope as Relevant Managed Service Providers. If you provide IT services, security operations, cloud management, or infrastructure support to essential services operators, you will face direct regulatory obligations.

    This means:

  • Registration with the ICO (the proposed regulator for RMSPs)
  • Compliance with security duties appropriate to your services
  • Incident reporting within the 24/72-hour framework
  • Potential inspection and information requests from regulators
  • Flow-down of security requirements through your own supply chain
  • For MSPs that have built their business model on speed and flexibility, this represents a structural shift. Security governance, documentation, and audit readiness become competitive necessities.

    If You Supply to Regulated Entities

    Even if you are not directly in scope, expect compliance pressure from customers. The Bill places supply chain risk management obligations on in-scope organisations. They will need to demonstrate that their suppliers meet appropriate security standards.

    If you sell into critical infrastructure, healthcare, energy, transport, or financial services, your customers will soon be asking for:

  • Evidence of security controls aligned to recognised frameworks
  • Incident notification clauses in contracts
  • Audit rights and transparency around security practices
  • Business continuity and disaster recovery capabilities
  • This is already happening informally but the Bill formalises it.

    If You Are Outside Scope Entirely

    For organisations with no connection to critical infrastructure or regulated digital services, the direct impact is limited. But the indirect effects are worth noting. The Bill signals where UK cyber regulation is heading. The boundary between "regulated" and "unregulated" will not remain static. And the security practices the Bill mandates - CAF alignment, robust incident response, supply chain oversight - are usually good practice regardless of regulatory obligation.

    The NIS2 Comparison

    Organisations operating across the UK and EU face a familiar challenge: parallel but not identical regimes. The Bill and NIS2 share principles - 24/72-hour reporting, supply chain obligations, expanded scope - but differ in implementation:

    FactorUK BillEU NIS2
    Regulator modelSector-specific (e.g., Ofcom, Ofgem, ICO)Designated national authorities
    NotificationDual: regulator + NCSCSingle competent authority
    Data centre thresholds1MW colo / 10MW enterpriseNo explicit capacity thresholds
    Critical supplier mechanismSecretary of State designationNot explicitly included
    Maximum penalties£17m / 4% turnover€10m / 2% turnover (essential services)
    Baseline standardNCSC CAFMember state determined

    If you are already preparing for NIS2, you have a head start. But UK-specific obligations require dedicated attention; dual notification, CAF alignment, the critical supplier mechanism. Do not assume NIS2 compliance automatically satisfies UK requirements.

    Practical Preparation: What to Do Now

    Regardless of your current regulatory status, several actions make sense:

    1. Scope Assessment

    Determine whether your organisation or your services fall within the expanded definitions. For MSPs and data centre operators, this is straightforward. For suppliers to critical infrastructure, it requires understanding your customers' regulatory status and whether designation as a critical supplier is plausible.

    2. Incident Response Playbook Update

    The 24-hour notification window is unforgiving. Most organisations currently take 48-72 hours simply to understand whether an incident is significant. You need:

  • Pre-defined criteria for "significant incident" that align with the Bill’s thresholds
  • Automated detection and alerting capable of flagging incidents within hours, not days
  • Draft notification templates for both early warning and full reports
  • Established communication channels with your sector regulator and the NCSC
  • Clear escalation paths that do not require committee approval at 2am
  • 3. CAF Mapping

    If you have not mapped your controls against the Cyber Assessment Framework, do so. The CAF is not a checklist; it is an outcomes-based framework. For each of its four objectives, identify your current maturity, gaps, and remediation roadmap.

    4. Supply Chain Audit

    In-scope organisations must manage cyber risk throughout their supply chains. Even if you are not directly regulated, your customers will expect cooperation. Review your contracts, security questionnaires, and incident notification clauses. Ensure you can meet the security and reporting expectations that will flow down from regulated customers.

    5. Board Engagement

    The Bill elevates cyber resilience to a board-level accountability. Security is no longer an IT concern; it is a regulatory compliance and business continuity issue. Ensure your board understands the Bill’s implications for the organisation, the potential penalties, and the investment required to comply.

    The Bottom Line

    The Cyber Security and Resilience Bill is not a revolution. It is an evolution - an update to legislation written in 2018 for a threat landscape that has transformed since then. The core obligations are extensions of existing principles: know your risks, protect your systems, detect incidents quickly, report them promptly, and manage your supply chain.

    For CISOs, the practical reality is that most of what the Bill requires should already be happening in well-run security programmes. The difference is that compliance becomes mandatory rather than voluntary, and the penalties for failure become severe rather than symbolic.

    The organisations that will handle this transition smoothly are those that start preparing now, while the Bill is still in Parliament and the implementation timeline remains measured. Those that wait for Royal Assent or the first enforcement action will face compressed timelines and elevated costs. The smart move is to prepare now.

    See our practical CISO checklist for the Bill →

    Share this article

    Richard Midwinter
    CTO
    Richard Midwinter

    Seeking Security Insights for Your Business?

    Our fractional CISOs can help you implement the strategies discussed in this article. Book a call to discuss your security needs.

    Book a Call