This browser is not actively supported anymore. For the best passle experience, we strongly recommend you upgrade your browser.
Back

Blog

| 3 minute read

Cyber Resilience Bill: Is your organisation ready for the new era of cyber accountability?

The UK Government’s Cyber Security and Resilience Bill marks a turning point in how organisations must prepare for and respond to cyber threats.  

With cyber-attacks costing the UK economy nearly £15 billion annually, this legislation introduces stricter obligations for essential services and their suppliers, including managed service providers (MSPs) and data centres. 

The new legislation expands the scope of the current Network and Information Systems (NIS) 2018 Regulations, which regulate essential services and introduce a stricter enforcement regime for non-compliance, as well as enabling the Government to take swifter action in response to changes in the threat landscape. 

In the July 2024 King’s Speech, the Government announced it would introduce a Cyber Security and Resilience Bill to strengthen the UK’s cyber defences and build the resilience of the UK’s essential and digital services. On 1 April 2025, the Government published a Cyber Security and Resilience Policy Statement, which built on the measures outlined in the King’s Speech to set out the scope and ambition of the Bill.

The Stakes: why cyber risk is a £15 billion problem

Real-world disruption

In the year preceding September 2025, the National Cyber Security Centre (NCSC) managed 429 cyber incidents, 204 of which were considered nationally significant – meaning they had a substantial impact on national security, economic stability, or public safety. Of these incidents, 18 were classified as “highly significant” in nature, marking a 50% increase from the previous year.  Across the economy, organisations in the UK are facing daily cyber-attacks, with over 600,000 businesses suffering an attack last year.

What you need to know about the UK’s cyber security shake-up

For the first time, medium and large MSPs and data centres will fall under direct regulation. This matters because these entities hold trusted access to sensitive systems and data across government and business networks.  Under the new regime, organisations in scope must:

Meet minimum security standards

Baseline security requirements will be enforced to close gaps that attackers exploit. This includes technical controls, governance measures, and supply chain resilience.

Implement rapid incident reporting

Significant cyber incidents must be reported to regulators and the NCSC within 24 hours, with a comprehensive report submitted within 72 hours. This accelerates national response and improves threat intelligence sharing.

Strengthen supply chain security

Organisations must ensure that critical suppliers meet robust security obligations.  Regulators will have powers to designate suppliers as critical, imposing mandatory compliance to prevent systemic vulnerabilities.

Key measures in the Bill: what’s changing and why it matters

The Bill introduces a new regulatory landscape that demands proactive compliance and strategic planning. Here’s what organisations need to know:

Expanded scope

For the first time, MSPs, data centres, and critical suppliers are brought under direct regulation. As the NHS and Marks and Spencer attacks demonstrated, key digital providers hold privileged access to sensitive systems, making them high-value targets for attackers.

Mandatory reporting

Organisations must report significant cyber incidents to regulators and the NCSC within 24 hours, followed by a full report within 72 hours. This rapid reporting framework is designed to accelerate national response and improve threat intelligence.

Regulatory powers

Regulators can now designate critical suppliers and enforce minimum security standards across the supply chain, closing systemic vulnerabilities.

Enforcement

Non-compliance will attract turnover-based penalties, making security lapses costlier than compliance. This shifts cyber security from a discretionary spend to a legal obligation.

Government intervention

The Technology Secretary gains new powers to instruct regulators and the organisations they oversee, such as NHS Trusts and Thames Water, to take specific steps to prevent cyber-attacks where there is a threat to UK national security. This includes requiring them to strengthen monitoring or isolate high-risk systems to protect and secure essential services. These powers enable the Government to mandate proportionate actions during national security threats, such as isolating vulnerable systems or enhancing real-time monitoring.

What organisations should do: from compliance to resilience

Assess cyber readiness

With only 8% of UK organisations considered “mature” in cyber security, now is the time to benchmark your cyber security posture.

Adopt best practices 

Implement NCSC guidance such as Cyber Essentials, Active Cyber Defence, and the Cyber Assessment Framework to strengthen your baseline.

Prepare for compliance

Develop robust incident response plans and ensure supply chain security measures are embedded in contracts and governance frameworks.

How Anthony Collins can help

Navigating the Bill requires more than technical fixes - it demands legal clarity and strategic compliance planning. At Anthony Collins, we can help you:

  • Interpret the Bill’s requirements and assess your organisation’s exposure.
  • Develop compliance frameworks aligned with UK GDPR and the Cyber Governance Code of Practice.
  • Draft and review supplier contracts to ensure robust cyber obligations across your supply chain.
  • Advise on incident response protocols to meet reporting obligations without compromising data privacy.
  • Train leadership and boards on governance responsibilities under the new regime.

For further information, contact Ben Pumphrey, head of data governance at Anthony Collins LLP.

To make sure you receive all of our latest insights, subscribe here.

Tags

cyber security , data, UK cyber legislation, Cyber resilience, all sectors