Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Parliament Asks Security Pros to Shape Cyber Security and Resilience B

January 13, 2026

The State of Trusted Open Source

January 13, 2026

Illicit Crypto Activity Hits Record $158bn in 2025

January 13, 2026
Facebook X (Twitter) Instagram
Tuesday, January 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Parliament Asks Security Pros to Shape Cyber Security and Resilience B
News

Parliament Asks Security Pros to Shape Cyber Security and Resilience B

Team-CWDBy Team-CWDJanuary 13, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A parliamentary committee has asked for industry input to help it better scrutinize the Cyber Security and Resilience Bill (CSRB).

First trailed in the King’s Speech in 2024, the CSRB is the long-awaited successor to the NIS Regulations 2018 and promises a NIS2-style revamp of UK cyber regulation for critical infrastructure sectors.

Having completed its second reading in parliament last week, it has now reached the committee stage, where the legislation will be subject to further review.

The Public Bill Committee is asking for anyone with “relevant expertise and experience or a special interest” in the bill to submit written views to it as soon as possible. It will begin receiving oral evidence from February 3, and although scrutiny is set to continue into March, early engagement is encouraged.

“Anyone considering submitting written evidence is strongly advised to do so as soon as possible, as the committee can conclude its considerations earlier than the expected deadline,” it warned.

Read more on the CSRB: UK Government Finally Introduces Cyber Security and Resilience Bill

The committee is expected to report by March 5, after which the bill will receive its third reading in the House of Commons, before reaching the Lords in spring/summer. Royal Assent is scheduled for late 2026.

Given that enhancing cybersecurity has broad cross-party support, it’s unlikely that the bill will be forced to undergo significant revision due to political differences in the House, making industry feedback particularly important.

The bill currently seeks to implement several key updates to the NIS Regulations 2018. These include:

  • An expanded scope to include MSPs, datacenters, large load controllers (e.g., EV charging points) and other organizations yet to be defined by regulators
  • Stricter rules around incident reporting timelines and a wider scope for reportable incidents
  • A mandate for in-scope organizations to manage supply chain risk more proactively
  • A requirement for in-scope organizations to meet “proportionate and up-to-date security requirements” drawn from the NCSC Cyber Assessment Framework (CAF)
  • Stronger powers for regulators, and potentially higher penalties

Much Still to Be Decided

Trend Micro’s UK cybersecurity director, Jonathan Lee, welcomed the consultation.

“Involving those on the frontline who work with clients on a day-to-day basis is imperative in making sure that the legislation achieves its desired outcomes,” he told Infosecurity.

“I’d caution that the consultation needs to make sure that it reaches all areas of the cybersecurity practitioner community, not just big tech companies. It should seek to ensure that voices from SMEs and MSPs to incident responders, as well as cybersecurity companies are all heard.”

Lee noted that there are several areas where the bill needs revising: “Clearer, risk‑based definitions for managed services and critical suppliers; streamlined and proportionate incident‑reporting thresholds to avoid over‑reporting; consistency across regulators and better alignment with overlapping regimes to cut duplication and cost‑recovery disincentives; and transparent information‑sharing mechanisms that protect sensitive data while improving resilience.”

Mark Bailey, partner at Charles Russell Speechlys, agreed that there are still significant gaps in the legislation.

“A significant amount of the operational detail is still to be set out in secondary legislation, covering areas like incident reporting thresholds, critical supplier definitions and managed service provider obligations,” he told Infosecurity.

“This is where we may see more refinement, especially in response to industry feedback. Key questions around technical standards, portal-based reporting mechanisms and enforcement timelines are likely to be shaped in this next phase.”

More information on submitting written evidence can be found here.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe State of Trusted Open Source
Team-CWD
  • Website

Related Posts

News

The State of Trusted Open Source

January 13, 2026
News

Illicit Crypto Activity Hits Record $158bn in 2025

January 13, 2026
News

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

January 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.