In this blog, we examine the recent amendments to the Cyber Security and Resilience (Network and Information Systems) Bill and what they reveal about the Government’s intention to make cyber resilience a core board-level responsibility. We explain how these changes align with wider regulatory trends which increasingly hold boards directly accountable for cyber risk management and oversight. We also outline practical steps organisations can take to prepare for the requirements set out in the Bill, including governance, security testing and exercising, as well as reporting.
The Cyber Security and Resilience (Network and Information Systems) Bill was introduced to Parliament on 12 November 2025, with the goal of reforming and adding to the existing 2018 Network and Information Systems (NIS) Regulations 2018. Whilst the Bill itself does not impact every organisation within the UK, it is a clear indication of the Government’s approach to cyber security. At the time of writing, the Bill remains in the House of Commons at the Report Stage, which is the stage where amendments can be proposed.
The Changes Introduced by the Bill and its Recent Amendments
One of the most significant changes that the Bill will introduce is a broadening of which organisations fall in scope of the UK’s cyber security regulatory framework. As was seen in the original draft, this will not only include operators of essential services, but also digital service providers, managed service providers, and critical suppliers whose disruption could have national-level consequences. A key amendment to the Bill has been the inclusion of even more sectors under these definitions, designating as ‘essential activities’ the manufacturing of critical transport equipment, as well as some food and essential goods retail. Local authorities would also be brought into scope of the NIS Regulations in relation to their functions managing electoral rolls and social care records.
The changes introduced by the Bill also highlight a clear expectation that boards will play a more active role in strengthening organisational resilience. Specifically, the amendments point towards:
- Increased board oversight and accountability for security, with cyber risk treated as a strategic governance issue rather than a technical concern
- Greater emphasis on board training, ensuring board members are able to identify risks and assess appropriate risk management
- A broader security remit that explicitly includes fraud
- Increased reporting
- Regular testing of network and information systems.
As part of the amendments, it has also been put forward that within 12 months of passing the Act, the Secretary of State will review whether amending the Computer Misuse Act 1990 could improve resilience.
Why Amendments Matter – Even if You’re Not Directly in Scope
Amendments to a bill are important as they signal a broader shift, and an insight into the direction the Government intends to take. Whilst such bills often focus on the most critical areas first, their influence rarely stops there. Expectations typically extend across the business landscape more broadly, meaning even those not initially in scope will feel the impact as standards filter through.
This shift is already taking place; governments and regulators worldwide are increasingly holding boards directly accountable for cyber security, treating it as a core governance and fiduciary responsibility, instead of simply an IT-related concern as it has traditionally been viewed. In addition to the Cyber Security and Resilience Bill, initiatives such as the EU’s NIS2 Directive and the Digital Operational Resilience Act (DORA), and the UK’s Cyber Governance Code of Practice explicitly require boards to oversee cyber risk, approve strategies, ensure training, monitor incidents, and maintain documented evidence of engagement, with potential personal liability for failures. Meanwhile, the UK’s data protection regulator, the Information Commissioner’s Office (ICO), issued four of the largest fines it has ever imposed last year, all for breaches of the General Data Protection Regulation (GDPR) relating to insufficient data security technical and organisational measures (TOMs). These enforcement actions clearly demonstrate that regulators are not hesitating to use their enforcement powers to penalise weak cyber governance and, with the largest of these fines totalling at £14 million, the severe financial consequences organisations face for failing to implement robust security controls.
How Can Organisations Prepare
In our blog on Strengthening Your Cyber Defences: Practical Steps for Every Business, we highlighted some of they key measures all organisations should have in place to enhance their security posture and protect against attacks. However, below are some practical steps you can take to align specifically with the Cyber Security and Resilience Bill.
Understand current cyber security and compliance posture
A core element of strengthening resilience and aligning with new regulatory requirements is gaining a clear and accurate view of your current cyber security and compliance posture. Conducting a comprehensive cyber security gap analysis enables you to identify where existing controls, policies and processes fall short of regulatory expectations and best practice. Importantly, it also helps you to prioritise remediation activities, ensuring that limited resources are directed toward the areas of greatest impact and supporting the Board’s ability to make informed strategic decisions about risk, investment and resilience. See below to learn more.
Ensuring cyber responsibility
One of the first steps your organisation can take is to ensure that explicit responsibility or accountability for cyber security has been applied at board level, so that the Board can gain sufficient oversight.
As part of this, you should consider providing tailored training for directors and senior leaders, beyond standard awareness training. Such training should consider areas such as understanding trends, interpreting technical risk in a strategic manner and evaluating resilience.
Incorporating fraud into risk practices
As stated above, the Bill identifies the need for fraud to be included within risk; as such, your organisation should evaluate its risk practices to ensure that fraud is properly considered, and where it is not, take steps to integrate it.
Establish regular testing and reporting
Your organisation should look to conduct regular penetration testing and resilience exercises (see below for more details) to verify that controls are operating as expected, and that threats can be detected and responded to in an efficient manner. You should also assess your reporting process to ensure that cyber incidents can be escalated to the Board promptly and through an established chain.
How URM Can Help
A Clear Starting Point: URM’s Cyber Security Headline Assessment
To help boards understand their current level of resilience, URM offers a Cyber Security Headline Assessment – a concise, business focused evaluation of your organisation’s cyber posture.
This assessment provides:
- A clear view of your organisation’s strengths and vulnerabilities
- A practical roadmap for improving resilience
- Insight into both likelihood reduction (preventing breaches) and impact reduction (minimising damage)
- A format designed specifically for senior leaders and boards
It’s an effective way to benchmark your current maturity and prioritise investment without unnecessary complexity.
Supporting Broader Resilience and Compliance
URM brings over two decades of experience providing risk management consultancy services and helping organisations implement and maintain security frameworks such as ISO 27001, Cyber Essentials and PCI DSS. Our services include:
- Cyber incident exercising (as an NCSC Assured Service Provider)
- Risk assessment and treatment support using our Abriska risk management software suite. Available in a range of modules, Abriska can support your assessment of information security risk, enterprise risk, supply chain risk management, and more.
- CREST accredited pen testing, including infrastructure penetration testing, networks, cloud, web and mobile application penetration testing and bespoke business scenarios
Our goal is to help organisations build resilience in a way that is proportionate, practical and aligned with their strategic objectives.
Find out through a Cyber Security Headline Assessment
Speak to URM about a Cyber Security Headline Assessment.
URM is pleased to provide a FREE 30 minute consultation on penetration testing for any UK-based organisation.
On 23 January 2023, NCSC published an updated set of requirements, v.3.1 for the Cyber Essentials scheme....
URM’s blog explores how Cyber Essentials can help your legal practice enhance its security posture and achieve/maintain its SQM or Lexcel accreditation.
URM’s blog highlights the growing threat to cyber security in the UK and the importance of the Cyber Essentials scheme in mitigating these risks.

