Royal Assent is expected in 2026. Compliance deadlines follow in 2027 and 2028. Start now.
1 — Find out if you are in scope before the Bill passes. Check whether you are an operator of essential services (OES), a managed service provider, a data centre, or a supplier to any of these. The DCS mechanism pulls in organisations that do not see themselves as part of critical national infrastructure.
2 — Switch to live monitoring — quarterly scans will not meet the 24-hour window. You need real-time visibility into your external exposure, with dated detection logs.
3 — Audit your supply chain now, not after an incident. List critical suppliers. Check their external exposure. Update contracts to cover notification, audit rights and security duties.
4 — Test your incident response against the 24 and 72-hour windows. Who sends the initial notification? Who contacts the NCSC? Define what counts as a significant cyber incident. Run drills.
5 — Align with the NCSC Cyber Assessment Framework before regulators ask. Run a gap review. Fix issues by real risk level. Keep records of every fix.