Recent months have seen a string of high‑profile cyber breaches that disrupted UK companies and supply chains, prompting the government to introduce the Cyber Security and Resilience (Network and Information Systems) Bill to Parliament on 12 November 2025. The Bill is intended to update the Network and Information Systems Regulations 2018 by widening scope, strengthening incident reporting and raising regulators’ enforcement powers and fines; many elements align with the EU’s NIS2 Directive but include distinct UK variations. [1][6][5]

A central change is the expansion of the regime beyond the current “operators of essential services” and “relevant digital service providers” to capture new categories of service providers judged critical to national resilience. The Bill specifically targets managed service providers that operate via their own networks and systems, data centres above specified power thresholds and “large load controllers” that can influence electrical demand, bringing into scope organisations that previously fell outside the NIS Regulations. According to government material, the reforms aim to secure an estimated additional 900–1,100 MSP entities and to strengthen protections for services such as the NHS. [1][2][3][5][6]

Data centres would be regulated where they exceed a rated IT load threshold, with the Department for Science, Innovation and Technology and Ofcom proposed as joint regulators for those assets. The Bill’s thresholds (for example, 1MW for data halls and larger enterprise facilities) closely mirror the definitions used in industry briefings, while large load controller coverage is set at organisations controlling 300MW or more of electrical load. Industry advisers have noted these numerical thresholds will be important for operators to map against their estates and determine regulatory exposure. [1][2][3][5]

A new mechanism for supply‑chain oversight permits sector regulators to designate particular vendors as “critical suppliers” where their failure would materially affect essential services. The policy statement and legal briefings make clear designated suppliers would be subject to regulation, with the right to appeal designations to the First‑Tier Tribunal under the proposals. The change reflects government concern that major incidents frequently originate in third‑party services rather than in the ultimate service provider. [5][2][3]

Incident reporting is reconfigured into a two‑stage duty for significant cyber incidents; affected organisations would be required to notify the regulator within 24 hours and follow up with a fuller report within 72 hours. The scope of reportable events is broadened to include incidents capable of having a significant impact on essential or relevant digital services, explicitly capturing ransomware and other disruption‑focused attacks. The Bill also shifts responsibility for customer notification, requiring organisations to inform customers directly “as soon as reasonably practicable” where they are likely to be adversely affected. Legal commentators warn that these tighter timeframes will require firms to revise detection, escalation and external‑communications procedures. [1][4][7]

Sanctions would be increased substantially, with two penalty bands modelled on the UK GDPR structure; the standard maximum would be the higher of £10 million or 2% of global turnover, rising to the higher of £17 million or 4% of global turnover for the most serious breaches, and regulators would be able to recover enforcement costs. Reuters and law firms highlight that the combination of higher fines, recoverable enforcement costs and designation powers represents a significant uplift in regulator leverage over both direct service providers and nominated suppliers. [1][6][2]

Businesses that already fall within the NIS Regulations and those likely to be brought into scope are being urged to act now. Practical steps advised by counsel include conducting gap analyses against anticipated requirements, testing incident reporting and customer notification processes to meet the compressed timeframes, reviewing supplier contracts to embed security and notification obligations, and reassessing cyber insurance cover. As the Bill is at first reading, proponents note further changes are possible and that the regime will be supplemented by secondary legislation and formal guidance once enacted. [1][3][4][5]

📌 Reference Map:

##Reference Map:

  • [1] (Burges Salmon) - Paragraph 1, Paragraph 2, Paragraph 3, Paragraph 5, Paragraph 6, Paragraph 7
  • [6] (Reuters) - Paragraph 1, Paragraph 6
  • [5] (UK Government policy statement) - Paragraph 1, Paragraph 2, Paragraph 4, Paragraph 7
  • [2] (Skadden) - Paragraph 2, Paragraph 3, Paragraph 4, Paragraph 6
  • [3] (DAC Beachcroft) - Paragraph 3, Paragraph 4, Paragraph 7
  • [4] (Osborne Clarke) - Paragraph 5, Paragraph 7
  • [7] (Cybersecurityandresiliencebill.com) - Paragraph 5

Source: Noah Wire Services