Precursor Security
UK Cyber Security & Resilience Bill 2025

Cyber Incident Reporting Requirements

The Resilience Bill introduces mandatory notification timelines: 24 hours for major incidents, 72 hours for significant incidents, with penalties up to £10 million for missed windows. This guide covers which incidents you must report, which regulators receive notification, and what your current GDPR process does and does not cover.

24hr Major Incident Window
NCSC + ICO + Sector Regulators
GDPR & Resilience Bill Aligned
24/7 Emergency Response
Scroll
Regulator Map

Who you notify, and when.

Submitting to one regulator does not satisfy the obligation to another. This table maps your sector to the required notification channels.

SectorRegulatorTimelineIncident Types
All in-scope organisationsNCSC24h (major) / 72h (significant)All qualifying incidents
Personal data involvedICO72h from discoveryData breaches (GDPR Art. 33)
Financial servicesFCAAs per FCA guidanceOperational incidents
TelecomsOfcomAs per Ofcom guidanceNetwork incidents
Energy / WaterOfgem / OfwatAs per sector guidanceInfrastructure incidents
Healthcare (NHS)NHS EnglandAs per DSPT guidancePatient data, system outages
Cybercrime offencesAction Fraud / NCAAs soon as practicableCriminal offences

This table reflects the Bill's proposed framework. Reporting channels and timelines will be confirmed in statutory guidance following Royal Assent. Not sure which regulators apply? We map your obligations in a single call.

Who This Applies To

Different roles, same deadline.

CISOs and Heads of InfoSec

If you report to the board on cyber risk

The Bill creates personal accountability for notification failures. Your incident response plan needs to specify who triggers the reporting clock, what initial information satisfies the 24-hour threshold, and which regulator receives the first call. If you cannot answer those three questions today, your plan is not ready.

Assess Reporting Readiness

DPOs and Compliance Managers

If you own the GDPR breach process

Your existing 72-hour ICO notification procedure does not satisfy the Resilience Bill. The Bill adds parallel mandatory reporting to the NCSC for operational incidents: separate submission, separate timeline, separate information requirements. The two obligations run concurrently but are not interchangeable.

See Reporting Comparison

Legal Counsel

If you advise on regulatory disclosure

Failure to notify carries penalties up to £10 million or 2% of global annual turnover, whichever is higher. Knowingly providing false or misleading information to a regulator carries criminal liability for directors. The disclosure decision is no longer a compliance judgment call; it is a legal risk with personal exposure.

Review Penalty Framework
Edge Cases

The questions that come up at 2 AM.

What if we are hit with ransomware at 11 PM and do not know the full scope?

You report what you know. The Bill does not require complete information for an initial notification. Submit an initial report within the applicable window using available information (systems affected, approximate discovery time, suspected attack vector). Interim updates follow as the investigation progresses. The error is waiting for certainty before notifying; the regulator treats that as a missed deadline.

What if our incident does not clearly meet the notification threshold?

This is the hardest judgment call in incident response. The default position should be: if in doubt, notify. A voluntary notification that turns out to be unnecessary carries no penalty. A missed mandatory notification triggers enforcement. We help organisations make this threshold determination quickly and document the rationale either way.

What if we already have a GDPR breach process?

For data breaches involving personal data, your GDPR process covers the ICO notification. It does not cover NCSC notification for operational incidents, sector regulator notification (FCA, Ofcom, NHS England), or customer notification for service disruptions without a personal data element. The Resilience Bill adds obligations in all three categories.

What if we report and it triggers regulatory investigation?

Proactive notification is a mitigating factor in enforcement decisions, not a trigger for investigation. Regulators have stated that the reporting obligation exists to improve national threat intelligence, not to create enforcement opportunities. Organisations that notify promptly and respond transparently consistently receive more favourable treatment.

Reporting Framework

What the Bill Requires, And How We Deliver It

Five obligations the Bill creates for in-scope organisations. Each one has a specific threshold, timeline, and submission requirement. None of them are satisfied by your existing GDPR breach notification procedure alone.

Classification

Reportable Incident Classification

Determining which cyber incidents must be reported under the UK Cyber Security and Resilience Bill: ransomware attacks, data breaches, significant service disruptions, supply chain compromises, and critical infrastructure failures. The reporting threshold is not a data breach threshold: it applies to any cyber incident causing significant service disruption, regardless of whether personal data is involved. Organisations regularly misclassify operational incidents as below-threshold events, only to receive regulatory inquiry when the incident becomes public.

Timelines

Notification Timeline Management: 24h, 72h, 30 Days

Major incidents: initial notification to NCSC within 24 hours of discovery. Significant incidents: initial notification within 72 hours. The 24-hour window for major incidents is frequently underestimated. From the moment an incident is discovered, the clock runs, including out of hours, weekends, and bank holidays. Your notification process must be operable at 2 AM on a Sunday.

Submission

Multi-Regulator Submission Preparation

Drafting incident reports for submission to the NCSC, ICO (for GDPR breaches), and sector-specific regulators. Each regulator has its own submission portal, required fields, and preferred format. An NCSC notification is not interchangeable with an ICO notification, and submitting to one does not satisfy the obligation to the other.

Communication

Stakeholder Communication and Coordination

Coordinating communications with regulators, customers, media, and law enforcement. We develop communication strategies that meet customer notification obligations under GDPR and the Bill, including service disruption notices where personal data is not involved but service impact is material. For MSPs, client notification adds a separate obligation layer.

Post-Incident

Post-Incident Compliance and Evidence

Ensuring follow-up actions satisfy regulatory requirements: implementing remediation measures, conducting post-incident reviews aligned with ISO 27035, and providing evidence of corrective actions to regulators. The final report due within 30 days must be comprehensive. Incomplete or vague final reports attract regulatory scrutiny even where initial notifications were timely.

Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

Incident Triage and Classification

Rapidly assessing whether the incident meets the Bill's reporting thresholds based on impact, data involved, and service disruption. We determine which regulators must be notified and applicable deadlines. The triage question is binary: does this incident meet the reporting threshold? We document the classification rationale either way. If the incident is below threshold, that decision needs to be defensible if a regulator later disagrees.

Step 02

Initial Notification (24-72 Hours)

Major incidents: initial notification to NCSC within 24 hours of discovery. Significant incidents: initial notification within 72 hours. The distinction is defined by the Bill's severity criteria. We apply them at triage, not retrospectively. Initial reports include incident discovery time, affected systems, suspected attack type, and current response status. You do not need a complete picture to file: submit what you know and provide updates as the investigation develops.

Step 03

Interim Updates and Investigation

Providing interim updates to regulators as the investigation progresses. We coordinate with forensic teams, legal counsel, and communications teams to ensure accurate and timely reporting. Sector-specific regulators (FCA, Ofcom, NHS England) are notified concurrently where applicable.

Step 04

Final Report and Remediation Evidence (30 Days)

Submitting final incident report within 30 days including: root cause analysis, full impact assessment, data affected, remediation actions taken, and measures to prevent recurrence. The final report is the regulatory record of how the incident was handled. Incomplete or vague final reports attract enforcement scrutiny even where initial notifications were timely.

Fixed-Price Programmes

Less than 0.15% of your penalty exposure.

All incident reporting programmes are fixed-price. Priced as an operational cost, not a capital project.

Procedure Development

Policies, templates, escalation matrix

Notification templatesEscalation matrixRegulator contact sheetClassification criteria
One-time

From £5,000

Readiness Programme

Tabletop exercise + gap analysis

Everything in ProceduresTabletop exerciseGDPR gap analysisStaff training
One-time

From £10,000

Annual Retainer

24/7 regulatory notification support

24/7 on-call advisoryRegulatory submissionsEmergency responseQuarterly reviews
Per year

From £15,000

Emergency Support

Active breach assistance

Immediate engagementSubmission draftingRegulator liaisonLegal coordination
Per day

£2,500/day

Fixed pricing after scoping call. Scope and cost confirmed in writing within 24 hours.

Get a Fixed-Price Scope
Detection First

The Reporting Obligation Starts with Detection.

You cannot report an incident you have not detected. The 24-hour notification window is only achievable if your detection and triage capabilities are already in place. These are the services that make incident reporting operationally possible.

Explore Detection Services

Active incident right now?

Our incident response team operates 24/7. Contact us before the notification window closes.

Emergency Response
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Free Scoping Call

Is your notification process ready for a 24-hour window?

Book a free scoping call: we assess your current GDPR process against the Bill's additional requirements, identify which regulators apply to your sector, and provide a fixed-price programme quote. No obligation. No day-rate surprises.

Assess My Reporting Obligations
CREST Accredited
24/7 Emergency Response
Fixed Pricing
From £5,000

Incident Reporting: Common Questions

Notification timelines, regulator requirements, GDPR overlap, penalties, pricing, and what to do during an active breach.

Cyber incident reporting services are priced by engagement type. Incident reporting procedure development (policies, notification templates, escalation matrix, regulator contact sheet) is £5,000-£8,000 as a one-time project. An incident reporting readiness programme including tabletop exercise simulating a notifiable incident, gap analysis against your current GDPR process, and staff training costs £10,000-£15,000. An incident reporting retainer providing 24/7 regulatory notification support and on-call advisory is £15,000-£25,000 per year. Annual retainer support costs less than 0.15% of the maximum penalty exposure, and is priced as an operational cost, not a capital project. Emergency incident reporting support during an active breach is £2,500 per day, covering regulatory submission drafting and regulator communication management. Fixed pricing is provided after assessing your regulatory requirements and current incident response capabilities.

Internal teams face significant challenges meeting the Bill's reporting requirements: (1) The 24-hour notification window for major incidents starts at discovery, leaving minimal time for internal coordination, legal review, and regulatory submission. (2) Regulatory notifications require specific formats and content that differ by sector regulator (NCSC, ICO, FCA, etc.). (3) Incorrect or incomplete initial notifications can trigger enforcement action. (4) Multi-regulator incidents (a data breach affecting critical infrastructure) require coordinated submissions to multiple authorities simultaneously. (5) Out-of-hours incidents need immediate reporting capability most internal teams cannot provide at 2 AM on a Sunday. (6) Post-incident reports require forensic detail and root cause analysis that may exceed internal capabilities. We provide expert support ensuring compliant notifications while your team focuses on containment and recovery.

The Bill requires reporting of: ransomware attacks, data breaches affecting personal or sensitive data, cyber attacks causing significant service disruption exceeding four hours for critical services, supply chain compromises affecting essential services, and security incidents affecting critical national infrastructure. The reporting threshold is not limited to data breaches. Operational incidents causing material service disruption trigger the obligation regardless of whether personal data is involved. Organisations frequently underestimate their scope because they conflate the Resilience Bill reporting obligation with their existing GDPR breach notification process.

The Bill uses a tiered structure based on incident severity. For major incidents (events causing or capable of causing significant service disruption, substantial data loss, or threats to critical infrastructure), initial notification to the NCSC is required within 24 hours of discovery. For significant incidents (events that materially degrade services but do not meet the major incident threshold), initial notification must be submitted within 72 hours. The 24-hour and 72-hour clocks start from the point of discovery, not from confirmed attribution or full assessment. You are not required to have a complete picture before filing: submit an initial notification with available information and follow up with interim updates as the investigation progresses. A final incident report covering root cause analysis, full impact assessment, affected data and individuals, and remediation actions must be submitted within 30 days of the initial notification. Under GDPR Article 33, data breaches involving personal data carry a separate 72-hour ICO notification obligation, which runs concurrently with any NCSC notification.

Regulator notification depends on your sector and the nature of the incident. All in-scope organisations must notify the NCSC for qualifying incidents (24 hours for major, 72 hours for significant). If personal data is involved, the ICO must be notified separately within 72 hours under GDPR Article 33. Financial services firms notify the FCA under existing operational resilience obligations. Telecoms operators notify Ofcom. Energy and water operators notify Ofgem and Ofwat via sector-specific portals. NHS and healthcare organisations notify NHS England via the DSPT incident reporting mechanism. Where a cybercrime offence is involved, Action Fraud and the NCA should also be notified. Submitting to one regulator does not satisfy the obligation to another. We map your specific regulatory notification obligations in a single engagement call.

To report a cyber incident to the NCSC, use the NCSC's online reporting service at report.ncsc.gov.uk. For significant incidents requiring immediate response, contact the NCSC 24/7 incident management team. Your initial report should include: the date and time of discovery, the systems or services affected, the suspected attack type (ransomware, phishing, unauthorised access), and whether personal data may be involved. You do not need a complete picture to file an initial notification. Submit what you know within the required window and provide updates as the investigation develops. If your organisation operates critical national infrastructure, contact your sector regulator concurrently. If you need assistance drafting and submitting the initial notification during an active incident, our team is available 24/7.

GDPR breach reporting (under Article 33) applies when personal data is involved and there is a risk to individuals' rights and freedoms. The Resilience Bill's incident reporting obligation applies to a broader category of cyber incidents, including ransomware, significant service disruptions, and supply chain compromises, regardless of whether personal data is involved. The two obligations are separate and run concurrently: you may need to notify the ICO under GDPR at the same time as notifying the NCSC under the Resilience Bill. The submission portals, information requirements, and regulatory contacts differ between the two frameworks. Organisations that rely solely on their existing GDPR process will miss the NCSC notification requirement. Our GDPR data protection services can be integrated with Resilience Bill compliance to build a unified notification procedure covering both obligations.

Incident reports must include: incident timeline (discovery, containment, eradication), systems and services affected, data compromised and the number of individuals impacted, suspected attack type and initial vector assessment, root cause analysis (in the final report), immediate response actions taken, and long-term remediation measures to prevent recurrence. Initial notifications do not require complete information: submit what you know and supplement with interim updates. The final report due within 30 days must be comprehensive. Submitting an incomplete or vague final report attracts regulatory scrutiny even where the initial notification was timely.

Yes, if the incident involves a data breach affecting personal data (GDPR) or significantly impacts service delivery. Under GDPR, affected individuals must be notified without undue delay if the breach is likely to result in a high risk to their rights and freedoms. The Resilience Bill may impose additional customer notification obligations for service disruptions affecting essential services, separate from the personal data element. Customer notification should occur after regulatory notification but without unreasonable delay. We help draft customer communications that balance transparency requirements with legal obligations and reputational considerations.

Failure to notify within required windows carries financial penalties up to £10 million or 2% of global annual turnover, whichever is higher. Additional consequences include mandatory improvement notices, increased regulatory scrutiny of future incidents, and in severe cases, criminal liability for directors under the Bill's provisions where knowingly false or misleading information is provided to a regulator. Proactive notification is a mitigating factor in enforcement decisions. Organisations that notify promptly, respond transparently, and demonstrate remediation consistently receive more favourable regulatory treatment than those that miss windows or self-report late.

If you believe a notifiable incident occurred and was not reported to the required regulators within the mandatory window, you face potential enforcement exposure. The appropriate steps are: (1) Do not destroy or alter any evidence or records related to the incident. (2) Take legal advice before making any contact with regulators. (3) Assess whether voluntary late disclosure is advisable: regulators typically treat proactive engagement more favourably than non-disclosure followed by investigation. (4) Document your decision-making process at the time: who made the notification decision, on what basis, and with what information available. If you received legal advice not to report, document that advice. We provide regulatory exposure assessments for organisations in this position, including advice on voluntary disclosure strategy and regulator engagement. Contact our regulatory response team.

Yes. We provide 24/7 emergency incident response including regulatory notification support. Our team coordinates with your incident response team, forensics providers, and legal counsel to ensure timely and accurate regulatory submissions. Emergency incident reporting support is available at £2,500 per day. If you are in an active incident right now, contact us immediately: the 24-hour notification window does not pause while you arrange support.