How Do The UK Cyber Security & Resilience Bill & The EU's NIS2 Compare?

The  British government's Cyber Security and Resilience Bill proposed in the King’s Speech is widely regarded as a much needed update to the Network and Information Systems (NIS) regulations and seen as the UK equivalent to the European Union (EU) NIS2.

It follows a review of the NIS regulations conducted two years ago and is described as an “urgent update” following the discovery that only just over half of operators of essential services have updated or strengthened existing policies and processes since the inception of NIS in 2018. However, the Bill differs from NIS2 in a number of ways.

Admittedly, the two do have similar aims. The Bill intends to strengthen the UK’s cyber defences by expanding the remit to include more digital services and their respective supply chains and by mandating increased incident reporting. This will ensure the government can keep abreast of trends by mandating disclosure of things like ransomware attacks. 

NIS2 will also apply to far more organisations, adding ‘important’ to ‘essential’ entities which is expected to see over 160,000 brought in scope, across over 17 verticals compared to the seven under NIS. Its aim is to improve the resilience of the EU through more timely incident reporting (an early warning must be made within 24 hours of a significant incident) which will facilitate the sharing of threat intelligence between member states. In this respect, NIS2 has been far more specific over who will be affected.

What’s Required?

We don’t yet know what demands the Bill will make in terms of processes and controls, but NIS2 states that both management bodies and employees will have to undergo security training on a regular basis to “identify risks and assess cybersecurity risk-management practices and their impact on the services”.

They’ll also have to implement technical, operational and organisational measures to manage those risks and to prevent and minimise the impact from their realisation.

Article 21 proceeds to name measures which include, for instance, risk management policies, business continuity/disaster recovery, system acquisition and maintenance, cyber hygiene, cryptography and encryption, and MFA.

When it comes to accountability and enforcement, NIS2 is also very clear on the potential repercussions of non-compliance. Senior management personnel can be held personally accountable and suspended from duty and regulators have a series of actions they can take to ensure compliance.

These range from warnings and ‘cease and desist’ orders, to requirements to meet certain risk management remedial obligations in a specified timeframe, to on-site inspections and targeted security audits (to be carried out by a third party and charged back to the entity), for example. There are also some hefty fines of a maximum of 10m Euros or 2% of worldwide annual turnover, whichever is higher, for essential entities and 7m Euros or 1.4% of worldwide annual turnover, whichever is higher, for important ones. 

The UK Bill has yet to unveil its punitive measures or whether board level personnel could potentially be implicated, although the latter is a general direction of travel seen globally. In the US we saw the SEC make board members accountable last July, for instance, when it revised its cyber incident disclosure processes.

The Implications For UK Businesses

Those organisations that do business in or with those based on the continent can expect to have to meet both sets of regulations and so will need to seek harmonisation where they can to reduce costs and complexity. There are already concerns that NIS2 will prove expensive, with medium-sized businesses newly within scope likely to experience the most upheaval. But the regulations also provide an opportunity to level the cyber security posture of these nations on an unprecedented scale. In doing so, they will drive down risk and the likelihood of economic disruption.

To both conserve spend and reap the maximum benefits from the process, organisations should therefore seek to look to streamline their compliance. This can be achieved by looking for overlap with other regulations and frameworks, such as ISO27001 and ISO22301, IEC62433, and the CIS critical controls. Many of these, in common with NIS2, compel the entity to implement an information security management system (ISMS), for instance, which is a management approach that governs people, process and technology. 

In keeping with the ISMS, the entity can put in place a Security Incident and Event Management (SIEM) to meet many of the demands of the regulations with respect to threat detection and response. Some SIEM also come with compliance management features that are specifically tuned to fulfil NIS2 and generate audit trails and reports to demonstrate compliance. 

How closely the UK Bill decides to mirror NIS2 remains to be seen but the impetus worldwide would seem to indicate we can expect the regulations to be more wide ranging, for the board to be accountable, and for incident reporting to be much more instantaneous.

All of these requirements will demand businesses implement far more rigorous processes regardless of which side of the channel they reside upon.

Innes Muir is Regional Manager at Logpoint

Image: Ideogram

You Might Also Read: 

Six Steps On The Road To NIS2 Compliance:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« What Security Teams Need To Know About The EU’s NIS 2 Directive
Making Insider Threats A Year Round Priority »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

C2B2 Consulting

C2B2 Consulting

C2B2 are experts in middleware support and consultancy. We specialise in ensuring scalability, performance and security of large scale systems.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

DTS Systeme

DTS Systeme

DTS Systeme is an IT service provider with a focus on the core areas of datacenter, technologies and IT security.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.