The UK Cyber Security and Resilience (CS&R) Bill reached Report Stage on 2 March 2026, after the Public Bill Committee concluded in February and a carry-over motion was passed; the bill is expected to reach the House of Lords in the next parliamentary session 1. The substantive provisions rewrite the operating model for UK in-scope organisations. Initial incident reports become due within 24 hours, full reports within 72 hours. Data centres are classified as essential services under joint oversight from the communications regulator Ofcom and the Department for Science, Innovation and Technology (DSIT). The definition of organisations covered by statutory cyber standards widens beyond the current Network and Information Systems (NIS) perimeter.
The 24-hour clock is the operational change. For UK-listed companies, board-level incident-escalation playbooks now have to land within a single trading day, which is a tighter cycle than most legal and communications teams have tested. Tabletop exercises run on a 72-hour assumption become out of date on the day the bill receives Royal Assent.
The enforcement template is already set. Per a decision by the UK Information Commissioner's Office (ICO), the information regulator fined outsourcing firm Capita £14 million in October 2025 for its 2023 breach, and the technical basis has become the 2026 template 2. The ICO cited Capita's absence of Privileged Access Management (PAM) controls, the tooling that gates and audits access to the highest-risk admin accounts, and the absence of Active Directory (AD) tiering, the Microsoft reference model for separating admin credentials by privilege level, as the General Data Protection Regulation (GDPR) security failures that enabled the attacker's privilege escalation. Precedent from Capita and the earlier Advanced Computer Software decision (£3.07m, March 2025) treats NCSC guidance as the GDPR technical baseline. For any organisation in ICO scope, NCSC cyber hygiene advice now carries the force of enforceable data-protection standard.
