Cyber Security and the Board: A Sign of What’s to Come

|
|
|
PUBLISHED on
10
March
2026
SUMMARY

In this blog, we examine the recent amendments to the Cyber Security and Resilience (Network and Information Systems) Bill and what they reveal about the Government’s intention to make cyber resilience a core board-level responsibility.  We explain how these changes align with wider regulatory trends which increasingly hold boards directly accountable for cyber risk management and oversight.  We also outline practical steps organisations can take to prepare for the requirements set out in the Bill, including governance, security testing and exercising, as well as reporting.

The Cyber Security and Resilience (Network and Information Systems) Bill was introduced to Parliament on 12 November 2025, with the goal of reforming and adding to the existing Network and Information Systems (NIS) Regulations 2018.  Whilst the Bill itself does not impact every organisation within the UK, it is a clear indication of the Government’s approach to cyber security.  At the time of writing, the Bill remains in the House of Commons at the Report Stage, which is the stage where amendments can be proposed.

Changes That the Bill and its Amendments Will Make

The Bill and its amendments signal a clear expectation that boards will take a more active role in driving organisational resilience. In particular, they point towards:

  • Increased board oversight and accountability: Cyber risk is to be treated as a strategic governance issue, not just a technical matter
  • Stronger focus on board competence: Greater emphasis on training so board members can identify cyber risks and evaluate risk management measures
  • A broader security remit: An explicit link between cyber security, resilience, and related harms such as fraud.
  • Enhanced reporting obligations: More frequent and detailed reporting to regulators on incidents and resilience measures.
  • Regular testing: Ongoing testing and exercising of network and information systems to demonstrate resilience in practice

One of the most significant changes introduced by the Bill is a broadening of which organisations fall in scope of the UK’s cyber security regulatory framework.  As was seen in the original draft, this will not only include operators of essential services, but also digital service providers, managed service providers, and critical suppliers whose disruption could have national-level consequences.  Recent amendments further broaden this scope by designating additional ‘essential activities’, including the manufacturing of critical transport equipment and certain food and essential goods retail services.  Local authorities would also fall within the NIS Regulations in respect of specific functions, such as managing electoral rolls and social care records.

As part of the amendments, it has also been put forward that within 12 months of passing the Act, the Secretary of State will review whether amending the Computer Misuse Act 1990 could improve resilience.

Why Amendments Matter – Even if You’re Not Directly in Scope

Amendments to a bill are important as they signal a broader shift, and an insight into the direction the Government intends to take.  Whilst such bills often focus on the most critical areas first, their influence rarely stops there.  Expectations typically extend across the business landscape more broadly, meaning even those not initially in scope will feel the impact as standards filter through.

This shift is already taking place; governments and regulators worldwide are increasingly holding boards directly accountable for cyber security, treating it as a core governance and fiduciary responsibility, instead of simply an IT-related concern as it has traditionally been viewed.  In addition to the Cyber Security and Resilience Bill, initiatives such as the Digital Operational Resilience Act (DORA) and the UK’s Cyber Governance Code of Practice explicitly require boards to oversee cyber risk, approve strategies, ensure training, monitor incidents, and maintain documented evidence of engagement, with potential personal liability for failures.  Meanwhile, the UK’s data protection regulator, the Information Commissioner’s Office (ICO), issued four of the largest fines it has ever imposed last year, all for breaches of the General Data Protection Regulation (GDPR) relating to insufficient data security technical and organisational measures (TOMs).  These enforcement actions clearly demonstrate that regulators are not hesitating to use their enforcement powers to penalise weak cyber governance and, with the largest of these fines totalling at £14 million, the severe financial consequences organisations face for failing to implement robust security controls.

How Can Organisations Prepare?

In our blog on Strengthening Your Cyber Defences: Practical Steps for Every Business, we highlighted some of the key measures all organisations should have in place to enhance their security posture and protect against attacks.  However, below are some practical steps you can take to align specifically with the Cyber Security and Resilience Bill.

Understand your current cyber security and compliance posture

A core element of strengthening resilience and aligning with new regulatory requirements is gaining a clear and accurate independent view of your current cyber security and compliance posture.  Conducting a comprehensive cyber security assessment enables you to identify where existing controls, policies and processes fall short of regulatory expectations and best practice.  Importantly, it also helps you to prioritise remediation activities, ensuring that limited resources are directed toward the areas of greatest impact and supporting the Board’s ability to make informed strategic decisions about risk, investment and resilience.  See below to learn more.

Ensuring cyber responsibility

One of the first steps your organisation can take is to ensure that explicit responsibility or accountability for cyber security has been applied at board level, so that the Board can gain sufficient oversight.

As part of this, you should consider providing tailored training for directors and senior leaders, beyond standard awareness training.  Such training should consider areas such as understanding trends, interpreting technical risk in a strategic manner and evaluating resilience.

Incorporating fraud into risk practices

As stated above, the Bill identifies the need for fraud to be included within risk; as such, your organisation should evaluate its risk practices to ensure that fraud is properly considered, and where it is not, take steps to integrate it.

Establish regular testing and reporting

Your organisation should look to conduct regular penetration testing and resilience exercises (see below for more details) to verify that controls are operating as expected, and that threats can be detected and responded to in an efficient manner.  You should also assess your reporting process to ensure that cyber incidents can be escalated to the Board promptly and through an established chain.

How URM Can Help

A Clear Starting Point: URM’s Cyber Security Headline Assessment

To help boards understand their current level of resilience, URM offers a Cyber Security Headline Assessment – a concise, business focused evaluation of your organisation’s cyber posture.

This assessment provides:

  • A clear view of your organisation’s strengths and vulnerabilities
  • A practical roadmap for improving resilience
  • Insight into both likelihood reduction (preventing breaches) and impact reduction (minimising damage)
  • A format designed specifically for senior leaders and boards

It’s an effective way to benchmark your current maturity and prioritise investment without unnecessary complexity.

Supporting Broader Resilience and Compliance

URM brings over two decades of experience providing risk management consultancy services and helping organisations implement and maintain security frameworks such as ISO 27001, Cyber Essentials and PCI DSS.  Our services include:

  • Cyber incident exercising (as an NCSC Assured Service Provider)
  • Risk assessment and treatment support using our Abriska risk management software suite.  Available in a range of modules, Abriska can support your assessment of information security risk, enterprise risk, supply chain risk management, and more.
  • CREST accredited pen testing, including infrastructure penetration testing, networks, cloud, web and mobile application penetration testing and bespoke business scenarios

Our goal is to help organisations build resilience in a way that is proportionate, practical and aligned with their strategic objectives.

Get practical guidance on preventing common cyber-attacks

Get practical guidance on how to prepare for and achieve Cyber Essentials and Cyber Essentials Plus certification, and protect your organisation against these attacks.
Thumbnail of the Blog Illustration
Cyber Security
Published on
12/12/2024
Mitigating Cyber Risks: Why Cyber Essentials Matters More Than Ever

URM’s blog highlights the growing threat to cyber security in the UK and the importance of the Cyber Essentials scheme in mitigating these risks.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
24/1/2025
Cyber Essentials: Improving Your Cyber Security as an SME

URM’s blog discusses the significant cyber security risks faced by small & medium-sized enterprises (SMEs), and how Cyber Essentials certification can help.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
20/11/2025
Cyber Security Case Study: The Human and Organisational Cost of a Breach

URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.

Read more
URM’s consultant has successfully guided us through our recent ISO 9001 CAV with zero NCs or OFIs.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.