30 March 2026

While it mainly targets operators of critical infrastructure and large organisations providing essential services, mid-market businesses should pay attention: changes in regulatory expectations and supply chain requirements could reach them sooner than expected.

The bill reflects a broader shift in regulatory treatment of cyber risk. Large organisations in scope will need to show stronger cyber resilience across operations and supply chains, which will in turn raise expectations for suppliers, partners, and service providers. Mid-market businesses may face stricter cyber requirements through procurement, contracts, and third-party risk assessments.

 

Businesses engaging with larger enterprises or operating in their supply chains should view the bill as a clear indicator of where future expectations are heading. Understanding its provisions, timeline, and preparation needs is increasingly crucial.

 

What is changing?

The Cyber Security and Resilience Bill updates the UK’s existing cyber security framework established by the Network and Information Systems Regulations 2018. Those regulations were designed to improve cyber security among organisations responsible for essential services such as energy, water, healthcare and transport. Since their introduction in 2018 the threat landscape has changed significantly, with cyber-attacks becoming more frequent, more organised and more disruptive.

The current NIS regulations apply mainly to operators of essential services and a limited group of digital service providers. The new framework is expected to broaden this scope to include a wider set of digital infrastructure organisations.

Cyber risk does not sit solely with infrastructure operators. Many vulnerabilities exist within the technology and service providers that support them. Expanding the regulatory scope is intended to address these wider ecosystem risks.

The bill also plans to introduce stronger cyber security obligations. Organisations within scope will need to demonstrate that cyber risk is being managed systematically. This includes things such as formal cyber risk management processes, continuous monitoring and threat detection, clear incident response procedures and stronger oversight of third-party and supplier risks. 

 

Existing reporting arrangements are often criticised for being inconsistent or slow. The new legislation is expected to introduce tighter timelines for reporting serious cyber incidents and clearer thresholds for what must be reported. 

Regulators will require earlier notification of significant incidents and more detailed information on how they are being managed. This is intended to improve visibility of emerging threats and enable quicker responses to incidents that may affect critical services.

Regulators themselves will gain additional powers under the proposed legislation. These powers may include the ability to carry out proactive cyber security audits, request evidence of security controls and investigate cyber incidents in greater depth. In some cases, regulators may also examine the cyber resilience of suppliers where those suppliers play a role in delivering essential services.

These maximum penalties apply only to organisations directly regulated under the new framework. The aim is to ensure cyber security is treated as a board-level risk rather than a purely technical issue.

 

When does it come into force?

The final timeline will evolve as the legislation progresses, but the overall direction is becoming clearer. As outlined earlier on, the government first submitted its plans for strengthening cyber regulation during 2025 when policy proposals for the bill were published and draft legislation was introduced to Parliament.

During 2026 the bill is expected to move through the remaining parliamentary stages and receive Royal Assent. Some regulatory powers may begin to take effect shortly after this point.

More detailed requirements are likely to follow between 2026 and 2027 through secondary legislation and guidance issued by regulators. This phased approach means many practical obligations will be clarified after the law is formally passed.

 

Who is affected and why mid-market businesses should pay attention?

The organisations most clearly targeted by the bill are operators of essential services, major digital infrastructure providers, large digital service companies and managed service providers that support critical sectors. Despite this focus the impact of the legislation will extend further across the economy. One of the key themes of the bill is supply chain security. Organisations regulated under the new framework will need to demonstrate that their suppliers meet appropriate cyber security standards.

 

This could appear in several ways. Businesses may face more detailed cyber security questionnaires during procurement. Some contracts may require formal security certifications or defined cyber controls. Larger organisations may introduce ongoing supplier security monitoring or periodic cyber assessments.

These expectations are already emerging. Many organisations are seeing greater scrutiny through procurement processes, third-party risk management programmes and cyber insurance requirements. Security frameworks such as Cyber Essentials and ISO/IEC 27001 are increasingly used by larger organisations to assess supplier security maturity.

The Cyber Security and Resilience Bill is likely to accelerate this trend and businesses that rely on contracts with larger enterprises should assume that cyber resilience will become a more prominent requirement.

 

How businesses can prepare?

Although the final details of the legislation are still developing, organisations do not need to wait for the law to take effect before strengthening their cyber resilience.

Senior leadership teams should understand the organisation’s cyber risk exposure and have clear oversight of how those risks are managed.

Businesses should also consider where they sit within wider supply chains. Organisations that provide services to infrastructure providers, large enterprises or regulated sectors may face greater scrutiny in the coming years. Understanding these relationships can help identify where cyber expectations may increase.

Assessing current cyber maturity is another useful step. Many organisations benefit from benchmarking their existing controls against recognised frameworks. Examples include Cyber Essentials, ISO 27001 and the NIST Cybersecurity Framework. These frameworks provide structured guidance on risk management, governance and technical security controls.

Organisations should ensure they have clear procedures for detecting, responding to and recovering from cyber incidents. This includes defined responsibilities, communication processes and escalation procedures. Testing these plans periodically can help ensure the organisation is prepared when incidents occur.

Find out more about Verlingue's Cyber Risk Management

 

Businesses should also expect an increase in security assurance requests from customers. Supplier questionnaires, requests for evidence of controls and periodic cyber reviews are becoming more common. Organisations that can clearly demonstrate their cyber security practices are likely to find this process easier to manage.

 

What comes next?

The Cyber Security and Resilience Bill is still moving through the legislative process, but its direction is clear. The UK government is placing greater emphasis on cyber resilience as part of national infrastructure protection and economic stability.

Further detail will emerge as the bill progresses and regulators publish additional guidance on how the framework will operate in practice. Implementation timelines, sector-specific expectations and compliance requirements will become clearer as the law approaches its enforcement stage. For organisational leaders, the message is clear: cyber resilience is now a strategic priority, not just an IT responsibility. Those who invest early in governance, controls, and incident readiness will be best positioned to meet evolving regulatory and customer expectations.

We will provide more updates as the legislation moves closer to implementation and further guidance becomes available. However, businesses that begin strengthening their cyber posture early will be better placed to respond as expectations evolve. For now, it remains a space worth watching closely as that deadline approaches!

Andrew Cassell | TechIOSH | Dip CII | CCIS

Risk Management Executive

andrew.cassell@verlingue.com

Connect on LinkedIn