UK Gov & NCSC Issue Urgent Warning to FTSE 350 Boards on Cyber Resilience

NCSC and UK Government Urge FTSE 350 to Make Cyber Resilience a Board-Level Priority Amid 50% Rise in Major Incidents

INFORMATIONAL
October 22, 2025
October 25, 2025
5m read
Policy and ComplianceRegulatorySecurity Operations

Related Entities(initial)

Other

FTSE 350Cyber EssentialsJaguar Land Rover Marks & SpencerThe Co-opDan Jarvis

Full Report(when first published)

Executive Summary

The UK's National Cyber Security Centre (NCSC) and government ministers have issued a direct and urgent call to action to the boards of Britain's top 350 listed companies. In a formal letter, they have urged FTSE 350 leaders to elevate cybersecurity from an IT issue to a core business survival and strategic priority. This warning is prompted by a 50% year-over-year increase in the number of highly significant cyber incidents managed by the NCSC and recent high-profile attacks on major UK corporations. The government has laid out a clear, three-step action plan for boards to improve their governance, threat visibility, and supply chain security.


Regulatory Details

While not a legally binding regulation, the letter and the associated codes of practice represent a strong statement of government expectation and establish a new baseline for corporate governance in the UK. The key components are:

  • Cyber Governance Code of Practice: Published in April 2025, this code provides a framework for boards to effectively manage cyber risk as part of their overall business strategy.
  • NCSC Early Warning Service: A free service that provides organizations with alerts about potential cyberattacks on their networks, based on intelligence gathered by the NCSC.
  • Cyber Essentials Certification: A government-backed scheme to help organizations protect against common cyber threats. The letter strongly advises businesses to mandate this certification for their suppliers.

Affected Organizations

The primary audience for this directive is the chief executives and chairs of all FTSE 350 companies. However, the principles and recommendations, particularly regarding supply chain security, extend to all UK businesses, including the small and medium-sized enterprises that form the backbone of corporate supply chains. The NCSC has also launched a "Cyber Action Toolkit" specifically for these smaller firms.

Compliance Requirements

The letter outlines three specific, actionable requirements for boards to demonstrate due diligence:

  1. Strategic Board-Level Governance: Boards must formally integrate cyber risk into their strategic planning and risk management frameworks, using the Cyber Governance Code of Practice as their guide. This means moving beyond technical discussions to understanding the business impact of cyber threats.
  2. Proactive Threat Intelligence: Organizations are expected to enroll in and utilize the NCSC's Early Warning service to gain proactive intelligence about threats targeting their specific networks and domains.
  3. Supply Chain Security Assurance: Businesses must take responsibility for the security of their supply chain. This includes assessing the cyber risk of their suppliers and contractually requiring adherence to recognized standards like Cyber Essentials. The report notes that only 14% of UK businesses currently do this, highlighting a massive systemic weakness.

Implementation Timeline

The call to action is immediate. While no specific deadlines are mentioned in the letter, the urgent tone and the backdrop of rising incidents imply that the government and regulators expect to see rapid adoption of these practices. Companies that fail to act may face increased scrutiny from regulators, investors, and insurers.

Impact Assessment

The government's initiative aims to force a cultural shift in how UK businesses approach cybersecurity.

  • Increased Board Accountability: This places the onus for cyber resilience squarely on the board of directors, making it a matter of fiduciary duty.
  • Improved National Resilience: By pushing these standards down through the supply chain, the initiative aims to uplift the cybersecurity posture of the entire UK economy, not just the largest companies.
  • Potential for Future Regulation: This 'guidance' could be a precursor to more formal regulation if voluntary adoption proves insufficient. Companies should view this as an opportunity to get ahead of future legal requirements.

Compliance Guidance

Boards and security leaders should take the following prioritized steps:

  1. Conduct a Governance Gap Analysis: Immediately review your current board-level cyber governance practices against the NCSC's Cyber Governance Code of Practice. Identify gaps and create a roadmap to address them.
  2. Enroll and Integrate: Sign up for the NCSC Early Warning service today. Ensure that the alerts from this service are integrated into your security operations team's workflow for investigation and response.
  3. Launch a Supply Chain Security Program: Begin the process of mapping your critical suppliers. Update procurement and contract language to require Cyber Essentials or an equivalent certification for new and existing suppliers. Start with your most critical Tier 1 suppliers and work downwards.

Timeline of Events

1
April 1, 2025
The UK government's Cyber Governance Code of Practice was published.
2
October 21, 2025
The NCSC and UK government send a formal letter to FTSE 350 companies urging action on cyber resilience.
3
October 22, 2025
This article was published

Article Updates

October 25, 2025

UK and Singapore launch global guidance for supply chain ransomware defense, endorsed by 67 nations.

MITRE ATT&CK Mitigations

Mandating Cyber Essentials certification for suppliers directly addresses this mitigation by establishing a baseline for supply chain security.

While the focus is on governance, a well-trained workforce remains a fundamental part of any resilience strategy.

Enrolling in the NCSC Early Warning service provides a form of external audit and proactive threat intelligence.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

In response to the NCSC's directive, FTSE 350 boards must establish a formal Cybersecurity Governance Program. This involves using the NCSC's Cyber Governance Code of Practice to structure board-level conversations. The board should appoint a specific committee or individual responsible for overseeing cyber risk, receive regular reports in business-friendly language (e.g., financial risk exposure), and integrate cyber risk into all strategic decisions, such as M&A or new product launches. This moves cybersecurity from a technical silo to a core component of corporate governance, directly addressing the government's primary demand.

To comply with the NCSC's guidance, organizations must implement a proactive Supply Chain Risk Management (SCRM) program. This starts with identifying and classifying critical suppliers. New and existing contracts must be updated to include clauses that mandate adherence to a specific security baseline, such as the UK's Cyber Essentials scheme. Organizations should also implement a process for ongoing monitoring, which could include supplier questionnaires, third-party risk scorecards, or rights to audit. This directly addresses the finding that only 14% of businesses assess supplier risk, tackling a major systemic weakness in the UK economy.

Sources & References(when first published)

Cyber security is business survival
NCSC (ncsc.gov.uk) October 21, 2025
Government urges stronger cyber security: What businesses need to know
Walker Morris (walkermorris.co.uk) October 21, 2025
Minister urges businesses to take cyber security seriously
Meacher-Jones (meacher-jones.co.uk) October 22, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

NCSCUKcyber resiliencegovernanceboard responsibilityFTSE 350supply chain security

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading