The United Kingdom's primary financial regulators—the Bank of England, the Financial Conduct Authority (FCA), and HM Treasury—have published a joint statement addressing the growing cyber resilience challenges posed by frontier Artificial Intelligence (AI) models. The statement, released on May 15, 2026, serves as a formal warning to all regulated financial firms and financial market infrastructures (FMIs). It emphasizes that boards and senior management must understand and proactively mitigate the risks of AI-powered cyberattacks, which can operate at a speed and scale beyond human capabilities. While no new regulations have been introduced, the authorities have made it clear that existing operational resilience rules compel firms to address these emerging threats.
The joint statement does not introduce new, specific AI-related legislation but rather interprets existing duties through the lens of this new technology. The key points from the regulators are:
This guidance applies to a broad swath of the UK's financial sector, including but not limited to:
Essentially, any organization regulated by the Bank of England or the FCA is expected to take note and act upon this guidance.
While not a new rulebook, the statement outlines clear expectations for compliance under the existing operational resilience frameworks (e.g., SYSC in the FCA Handbook).
The joint statement signals a significant shift in regulatory expectations. Firms that have underinvested in cybersecurity will find themselves increasingly exposed and under regulatory scrutiny. The business and operational impacts include:
Firms should take the following tactical steps:
The Bank of England, FCA, and HM Treasury release their joint statement on AI and cyber resilience.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.