{"id":13834,"date":"2026-02-03T18:03:21","date_gmt":"2026-02-03T18:03:21","guid":{"rendered":"https:\/\/davelevy.info\/wiki\/?p=13834"},"modified":"2026-02-03T18:03:25","modified_gmt":"2026-02-03T18:03:25","slug":"cyber-security-and-resilience-nis-bil","status":"publish","type":"post","link":"https:\/\/davelevy.info\/wiki\/cyber-security-and-resilience-nis-bil\/","title":{"rendered":"Cyber Security and Resilience (NIS) Bil"},"content":{"rendered":"\n<p>My notes and links<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Google Gemini says,<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><a href=\"https:\/\/www.gov.uk\/government\/collections\/cyber-security-and-resilience-bill\" target=\"_blank\" rel=\"noreferrer noopener\">UK Cyber Security and Resilience Bill (2025\/2026)<\/a> proposes strengthening national infrastructure security by expanding the scope of the <a href=\"https:\/\/www.gov.uk\/government\/collections\/nis-directive-and-nis-regulations-2018\" target=\"_blank\" rel=\"noreferrer noopener\">NIS Regulations<\/a> to cover more digital service providers, critical suppliers, and data centers. It introduces stricter incident reporting requirements (within 24 hours), mandatory risk management, and increased enforcement powers for regulators to protect essential services.\u00a0See <a href=\"https:\/\/share.google\/aimode\/VhLd83RULYbnUx3Rd\">here<\/a>.<\/p>\n<\/blockquote>\n\n\n\n<p>Also, &#8220;The legislation, introduced to Parliament on November 12, 2025, aims to modernize the UK&#8217;s, and in particular critical sectors&#8217;, defense against rising cyber threats, as described in the <a href=\"https:\/\/www.parliament.uk\/business\/news\/2026\/jan-2026\/cyber-security-and-resilience-network-and-information-systems-bill-call-for-evidence\/\" target=\"_blank\" rel=\"noreferrer noopener\">UK Parliament news release<\/a> and <a href=\"https:\/\/www.gov.uk\/government\/news\/new-cyber-action-plan-to-tackle-threats-and-strengthen-public-services\" target=\"_blank\" rel=\"noreferrer noopener\">GOV.UK press release<\/a>.&#8221;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Cyber Security and Resilience (NIS) Bill<\/strong>, introduced to Parliament on November 12, 2025, does not explicitly mandate specific frameworks like ISO 27001 or COBIT in law. Instead, it requires &#8220;appropriate and proportionate&#8221; technical and organizational measures.\u00a0See <a href=\"https:\/\/share.google\/aimode\/t5J0UAHqzMEaSGSVD\">here<\/a>. <\/p>\n<\/blockquote>\n\n\n\n<p>Note the US spelling of organizational, rather underlines the need for digital sovereignty.<\/p>\n\n\n\n<p>See also <a href=\"https:\/\/davelevy.info\/wiki\/date-use-access-act\/\">https:\/\/davelevy.info\/wiki\/date-use-access-act\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>My notes and links<\/p>\n","protected":false},"author":1,"featured_media":13835,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_share_on_mastodon":"0"},"categories":[140,3,1],"tags":[1099,914,141,911],"class_list":["post-13834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-politics","category-technology","category-uncategorized","tag-cybersecurity","tag-networking","tag-politics-2","tag-technology"],"share_on_mastodon":{"url":"https:\/\/mastodon.social\/@davelevy_eu\/116008013187873449","error":""},"jetpack_featured_media_url":"https:\/\/davelevy.info\/wiki\/wp-content\/uploads\/2026\/02\/cybersecurity-flyd-mT7lXZPjk7U-unsplash.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/13834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/comments?post=13834"}],"version-history":[{"count":2,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/13834\/revisions"}],"predecessor-version":[{"id":13837,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/13834\/revisions\/13837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media\/13835"}],"wp:attachment":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media?parent=13834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/categories?post=13834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/tags?post=13834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}