Andy Watkin-Child, Founding Partner of Parava Security Solutions examines why the UK Cyber Security and Resilience Bill marks a critical shift in how organisations must govern, manage and demonstrate cyber-resilience.
Cybersecurity has always mattered; what has changed is the world around it.
Nation-states – as well as the public and private sectors they encompass – can no longer afford to treat cyber-risk as a niche concern.
Once, cybersecurity could be brushed aside hidden under a thick shag-pile carpet and delegated to ‘the techies,’ those perceived practitioners of digital alchemy who simply made things work.
It was not something boards needed to see, let alone understand and too often, they did neither.
Our deep dependence on digital systems has caught up with us.
Persistent gaps in the management of digital dependency by nation-states and boards have exposed the soft underbelly of national and economic security.
We have failed to recognise the symbiotic relationship between technology, products and services.
As a result, both the public and private sectors remain vulnerable to a very real, growing and consequential cybersecurity threat.
Nation-states and organisations manage risk every day.
However, cyber-risk is distinct in its scale, complexity, interdependency and the challenges associated with its mitigation.
Cyber-risk is systemic and rapidly evolving, capable of cascading across sectors, borders and institutions, generating direct and indirect consequential losses and impacting national and economic security.
These characteristics set cyber-risks apart as one of the most significant risks faced by nation-states and boards today.
Cyber-attacks have consistently demonstrated these challenges with far-reaching consequences for national security, economic stability and corporate resilience.
Cyber-attacks have exposed enduring weaknesses in risk management and reinforced the need for robust governance, effective oversight and credible assurance of cyber-risk across every level of society.
Many of the critical services on which society depends, including energy, water, oil and gas, transportation, financial services, digital infrastructure and healthcare are digitally enabled and in many countries, privately owned.
These services are invariably operated under commercial models driven by profitability and the need to maintain a profit.
Commercial pressure can often lead to underinvestment in non-revenue-generating capabilities such as cybersecurity.
Consequently, governments face an increasingly complex and precarious reality as cyber-risk management is core to the management of national and economic security.
Cyber-risk issues and challenges identified in points one to ten require a whole-of-society approach to risk management.
An approach that has few remedies or levers to remediate outside of regulation.
Cyber-regulation remains the primary or only mechanism available to nation-states to influence cybersecurity risk management across both public and private sector organisations.
In 2018, the UK introduced the Network and Information Systems (NIS1) regulation to improve cybersecurity across critical national infrastructure.
However, its effectiveness has been uncertain. At best, NIS1 established basic cybersecurity requirements; at worst, it failed to adequately protect critical infrastructure from cyber-threats.
There have been very few publicly reported cases of non-compliance or fines.
The UK’s difficulties in implementing NIS1 reflect those of EU member states.
In response, EU member states introduced major updates to NIS1, resulting in NIS2, which was formally adopted and published in January 2023.
The Bill makes significant updates to NIS1, the Cyber Security and Resilience Bill:
UK Cyber Resilience legislation means organisations can no longer treat cybersecurity as a technical or reactive issue.
Businesses within scope must actively prevent cyber-incidents, prepare for them, respond effectively and recover quickly whilst be able to demonstrate this capability.
This includes clear accountability, strong governance with board-level oversight, documented risk and incident response plans, faster and more formal incident reporting and tighter controls over suppliers and third parties.
Regulators will have stronger powers to assess compliance and impose penalties, making cyber-resilience an ongoing operational and regulatory responsibility.
The UK Cyber Security and Resilience Bill is an important step toward improving cybersecurity for organisations it covers.
However, when compared with approaches taken by other countries, such as the EU’s NIS2 and DORA or the US Cybersecurity Maturity Model Certification (CMMC), the Bill faces significant challenges before it is approved.
These challenges could weaken cybersecurity risk management for critical national infrastructure providers, managed service providers and digital services, potentially leaving the UK behind and reducing cyber defence capabilities across both the public and private sectors.
The Bill gives the Secretary of State powers, including setting strategic priorities, creating regulations, reporting to Parliament, directing organisations during national security events, overseeing regulators and developing codes of practice.
However, the Bill lacks clear detail on how organisations should manage cybersecurity risks in practice.
Unlike similar regulations, the Bill does not require organisations to follow specific cybersecurity frameworks or standards.
These frameworks provide clear boundaries, help organisations measure their cybersecurity maturity and enable effective oversight and assurance by boards, executives, regulators and auditors.
The Bill also does not assign clear responsibility for cybersecurity risk management governance, oversight or assurance to organisational leadership.
It does not link compliance to civil or criminal penalties, which are often necessary to drive accountability and deter non-compliance.
Without these mechanisms, cybersecurity risks may not receive the leadership focus or investment needed to manage them effectively.
This article was originally published in the February edition of Security Journal UK. To read your FREE digital edition, click here.