Cybersecurity Strategies for UK Critical Infrastructure

Overview of the Current Cyber Threat Landscape

Public Limited Companies (PLCs) operating critical infrastructure in the UK face an increasingly diffuse and dangerous cyber threat environment gov.uk. Hostile state actors and organised cybercriminals are targeting essential services at unprecedented levels gov.uk. Ransomware remains the most immediate and disruptive threat to critical national infrastructure (CNI), with some attacks now aiming at industrial control systems (ICS) that run operational technology ncsc.gov.uk. The UK’s National Cyber Security Centre (NCSC) warns that these threats are “enduring and significant,” fueled by both geopolitical tensions and profit-driven crime gov.uk. Recent intelligence highlights state-sponsored groups from nations like China and Russia probing UK sectors – for example, a Chinese APT known as Volt Typhoon was observed compromising US energy, transport and water networks (likely to prepare for potential future disruption) ncsc.gov.ukgov.uk. Similarly, Russian-linked actors have launched destructive attacks abroad (e.g. against Ukraine) and could indirectly threaten UK networks gov.uk.

Compounding the state-sponsored threat, cybercriminal gangs continue to evolve their tactics. Ransomware crews such as BlackCat and Black Basta target critical firms globally, causing major data breaches and operational outages industrialcyber.co. The NCSC’s latest Annual Review noted a sharp rise in significant attacks, with 89 nationally significant cyber incidents in one year (up from 62 the previous year) cybersmart.co.uk. According to the UK government, half of UK businesses suffered a cyber breach or attack in the past 12 months gov.uk – a statistic that underscores the ubiquity of the threat. Adversaries are also leveraging new tools like artificial intelligence and readily available hacking kits to enhance their capabilities gov.uk.

Importantly for Boards, cyber attacks on infrastructure now have tangible real-world impacts. A single intrusion can disrupt essential services, as seen when a ransomware attack on an NHS IT supplier led to over 11,000 patient appointments being postponed at London hospitals gov.ukgov.uk. Such incidents erode public trust and can even endanger lives or national security. The government considers cyber threats to critical infrastructure a top-tier risk to public safety, noting that overall resilience is “not improving at the rate necessary to keep pace with the threat” gov.uk. In this landscape, Boards of Directors must treat cybersecurity as a core business risk – one that demands the same level of oversight as financial or legal risks bridewell.com.

Key Vulnerabilities in Critical Sectors

While all critical sectors share certain cyber challenges, each sector has distinct vulnerabilities that determined adversaries seek to exploit. Understanding these sector-specific weaknesses can help Boards ensure appropriate risk mitigation strategies are in place:

Energy Sector (Power & Utilities)

The energy sector’s heavy reliance on ICS and operational technology makes it a prime target. Many utilities run on legacy systems with minimal patching downtime, creating unpatched known vulnerabilities. Direct exposure of control systems (e.g. power grid SCADA controllers) to enterprise networks or the Internet can be an “easy target” for attackers insights.issgovernance.com. State actors have demonstrated capabilities to infiltrate electricity infrastructure – for instance, Russia’s cyber campaigns against Ukraine’s grid caused major blackouts, illustrating how power generation and distribution could be disrupted insights.issgovernance.com. In UK energy companies, expanded digitization (smart grids, IoT sensors in pipelines, etc.) broadens the attack surface insights.issgovernance.com. Key vulnerabilities include weak network segmentation between corporate IT and critical OT networks, outdated operating systems in plants, and insufficient monitoring of remote sites. A successful breach could halt power or gas supplies, with cascading effects on the economy and public safety insights.issgovernance.com. Boards in the energy sector should particularly scrutinize how well their organisations isolate and protect mission-critical control systems from cyber intrusion.

Transport Sector (Air, Rail, Sea & Road)

Transportation networks depend on complex information systems for safe and timely operations, but these systems often have inherited weaknesses. In rail and aviation, proprietary control networks (for signaling or air traffic) were historically isolated; today they are increasingly connected, raising the risk of intrusion. For example, ransomware has hit transport operators – one UK rail company suffered an attack that disrupted email and led to sensitive data leaks, showing even passenger-facing systems are at risk. Maritime and port facilities use industrial control systems for cranes, navigation aids, and fuel pumps; a breach could paralyse a port. Many transport firms also run on legacy technology (e.g. older operating systems in ticketing or baggage handling), and patching/security upgrades may lag due to uptime requirements. The transport sector is also highly interconnected – an outage at one airport or port can ripple widely. Attackers might exploit weak remote access controls (e.g. maintenance contractors VPN-ing into signaling equipment) or insufficient authentication on operational networks. Boards of transport PLCs must ensure that resilience and fail-safes are in place: for instance, manual fallback procedures (as airlines use when booking systems go down) and robust network segmentation to contain any breach. Lessons from the Colonial Pipeline incident – where an attack on IT forced a major fuel pipeline offline – show the importance of segmenting IT and OT networks in transport-related infrastructure industrialcyber.co.

Finance Sector (Banking & Finance)

Financial services are a long-standing target of cyber adversaries due to the direct monetisable data and funds at stake. UK banks and financial market infrastructure have comparatively mature cyber defences, yet vulnerabilities persist. Legacy core banking systems (e.g. mainframes) can be difficult to modernize and may not easily integrate advanced security controls, leaving potential gaps. Attackers frequently exploit the human element through phishing and social engineering – a successful spear-phishing of an employee at a bank can lead to fraudulent fund transfers or exposure of customer data. The finance sector also faces supply chain risks, as seen in incidents where attackers compromised software vendors or payment systems (for example, the SWIFT banking network breach overseas). Another concern is the rise of sophisticated denial-of-service attacks on financial exchanges or payment gateways, aiming to disrupt services. While financial regulators enforce strict cybersecurity rules, the sheer volume of daily threats means some will get through. Boards in the finance sector should be alert to systemic risks (e.g. attacks that could destabilise multiple institutions) and ensure strong incident response and redundancy – for instance, alternate payment channels if primary systems fail. With increasing regulatory scrutiny (e.g. the EU’s Digital Operational Resilience Act in finance), demonstrating control over these vulnerabilities is also a compliance imperative.

Healthcare Sector (NHS and Private Health)

Healthcare organisations, including the NHS, often operate with outdated IT estates and constrained resources, making them attractive targets. Many hospitals still use medical devices and software that run on older operating systems which cannot be easily patched digital.nhs.uk. This was tragically illustrated by the WannaCry ransomware attack in 2017, which spread through unpatched Windows systems – over 80 NHS trusts were affected, and an estimated 19,000+ patient appointments were cancelled as systems went offline nao.org.uk. Key vulnerabilities in healthcare include: poor network segregation (allowing malware to propagate from an infected PC to critical imaging or diagnostic machines), legacy equipment that is no longer supported (sometimes termed “untrustworthy” devices) digital.nhs.uk, and often an overwhelming dependency on third-party suppliers for IT services. Recent attacks on NHS IT suppliers have shown that a breach at a vendor can cascade into multiple hospitals gov.uk. Additionally, healthcare staff focus on patient care and may not prioritize cyber hygiene, making the sector prone to phishing. Boards in this sector must champion investments in modernising IT (phasing out legacy systems), enforce strict access controls (especially for administrators and sensitive patient databases), and support regular cyber awareness training for clinical and non-technical staff. Given the direct impact on patient safety, resilience planning (including well-practiced manual downtime procedures and backup systems) is a critical responsibility.

Water Sector (Water Supply & Treatment)

Water utilities present a mix of IT and OT vulnerabilities. Many water companies run geographically dispersed facilities (treatment plants, pumping stations) with remote monitoring and control, which if left insecure can be entry points. Historically, the water sector had lower cyber maturity and limited oversight, but recent attacks have proven it a viable target. In 2022, a UK water supplier (later identified as South Staffordshire Water) was breached by criminals – attackers claimed to have access to water treatment systems, highlighting potential risks to water safety. More recently, Southern Water in England suffered a Black Basta ransomware attack that compromised data on up to 10% of its customers industrialcyber.co. While Southern Water managed to avoid operational disruption, it incurred roughly £4.5 million in incident response costs bleepingcomputer.com. Common vulnerabilities in water utilities include: legacy SCADA controllers with default or hard-coded credentials, inadequate network separation between corporate IT and plant controls, and underinvestment in cybersecurity expertise. Additionally, supply chain connections (e.g. contractors managing SCADA software) can introduce weaknesses if not managed. Boards of water PLCs should ensure robust controls around their operational networks – for example, strict authentication for remote access, regular penetration testing of control systems, and contingency plans to maintain water service if monitoring systems are knocked out. Regulatory scrutiny is increasing here too; failures in water service due to cyber incidents would not only violate NIS Regulations but also quickly erode public confidence in essential utilities.

Regulatory and Compliance Obligations in the UK

UK PLCs in critical infrastructure sectors must navigate a landscape of cyber-specific regulations and standards. Boards have a duty to ensure their organisations comply with these obligations, or risk severe penalties and reputational damage. Key frameworks include the UK NIS Regulations 2018, data protection laws like UK GDPR, and forthcoming changes influenced by the EU’s NIS2 Directive. Understanding these is vital for board oversight:

UK Network & Information Systems (NIS) Regulations 2018

The NIS Regulations were introduced to improve the security and resilience of essential services. They apply to Operators of Essential Services (OES) in sectors such as energy, transport, health, water, and digital infrastructure, as well as certain digital service providers. NIS requires these organisations to take appropriate technical and organisational measures to secure their networks and to report significant incidents to regulators. In the UK, sector regulators (e.g. Ofgem for energy, the Department for Health for NHS, etc.) act as NIS “Competent Authorities” to audit and enforce compliance itgovernance.co.uk. Boards should be aware that non-compliance can lead to severe fines – up to £17 million for the most serious cases ico.org.uk. This upper penalty threshold underscores how seriously the government views negligence in protecting critical systems. For instance, failing to patch known vulnerabilities or lacking an incident response plan could be deemed a material contravention of NIS duties. Under NIS, Boards need to ensure their organisations implement robust cyber risk management (many use the NCSC’s Cyber Assessment Framework for guidance, see next section) and maintain effective oversight of third-party risks and continuity planning. Notably, the UK is currently updating NIS enforcement: a new Cyber Security and Resilience Bill planned for 2025 will expand NIS’s scope (covering more sectors and services such as managed providers and digital services) and place even greater emphasis on incident reporting and supply chain risk management simplynuc.com. Boards should stay abreast of these developments, as the regulatory bar for cyber resilience is being raised in line with evolving threats.

Data Protection (UK GDPR)

Cybersecurity is also intertwined with data protection compliance. The UK General Data Protection Regulation (GDPR) and Data Protection Act 2018 impose obligations to safeguard personal data – which almost all PLCs will handle (employees, customers, etc.). A cyber breach that exposes personal data can trigger GDPR violation penalties. The ICO (Information Commissioner’s Office) has the power to levy fines up to £17.5 million or 4% of global annual turnover, whichever is higher, for the most serious data protection failures ico.org.uk. For example, UK regulators have not hesitated to fine companies after major data breaches (British Airways and Marriott were both fined multi-million pound sums for incidents that compromised customer data). Boards must recognise that inadequate cybersecurity leading to a data breach is not just an IT issue, but a legal one – GDPR’s principle of “accountability” means organisations must demonstrate they took appropriate measures to protect personal data edpb.europa.eu. This includes having up-to-date security controls, access management, encryption where appropriate, and breach detection capabilities. Additionally, GDPR mandates breach reporting within 72 hours to authorities for qualifying incidents, which requires that the organisation have processes to rapidly escalate and manage incidents. Board directors could be held responsible if it’s found that negligence in governance (such as ignoring known security risks) led to a breach of data protection law. In practice, Boards should demand regular reports on the organisation’s data security posture and ensure GDPR compliance is assessed alongside other cyber frameworks.

EU NIS2 Directive – Anticipated Implications for UK PLCs

Although the UK is no longer in the EU, the EU’s NIS2 Directive (effective from late 2024) is highly relevant. Many UK PLCs have operations or supply-chain connections in the EU, and NIS2 represents a major tightening of cyber regulations across Europe. NIS2 expands the scope of regulated “essential entities” to 18 sectors, adding areas like space, chemicals, food, manufacturing, and more digital providers nccgroup.com. It also imposes a pivotal shift in leadership responsibility for cyber risk. Under NIS2, senior management can be held personally liable for non-compliance, and executives are legally obliged to approve and oversee cybersecurity risk measures nccgroup.com. The directive calls for enhanced risk management (including supply chain security and incident response planning) and mandates very stringent incident reporting (initial report within 24 hours of an incident, with a detailed report within 72 hours). Fines under NIS2 will be harmonised across the EU (up to 2% of global turnover for essential entities).

For UK companies, NIS2 does not directly apply domestically, but it sets a benchmark. The UK government has indicated its intent to align with many NIS2 principles in its own legislation simplynuc.com. The upcoming UK Cyber Security and Resilience Bill will update the NIS framework, likely expanding sector coverage and emphasizing areas like supply chain risk, much as NIS2 does simplynuc.com. Moreover, any UK PLC operating subsidiaries or services in the EU will have to comply with NIS2 in those jurisdictions. Boards should therefore familiarize themselves with NIS2’s key requirements. These include ensuring a robust cyber risk management regime is in place (covering governance, defence, detection, response, and recovery measures) and potentially conducting gap analyses against frameworks like ISO 27001 or the NCSC CAF which can help demonstrate compliance nccgroup.com. Another implication of NIS2 is increased regulatory enforcement powers – authorities can even order a company to cease operations or suspend management in extreme non-compliance cases nccgroup.com. While such powers are EU-specific, they signal the severity with which cyber negligence is viewed. UK Boards should proactively adopt best practices from NIS2 (e.g. board-level cyber risk oversight and accountability) rather than taking a siloed Brexit perspective. By doing so, they not only prepare for any future UK requirements but also bolster their organisation’s resilience and trustworthiness internationally.

Strategic Cybersecurity Frameworks and Risk Management Practices

Effective cybersecurity oversight requires a structured approach. Boards should ensure their organisations adopt recognized frameworks and standards that provide a systematic way to manage cyber risk. These frameworks turn the broad goal of “good cybersecurity” into concrete principles, controls, and metrics that can be assessed and improved over time. The following are key frameworks and practices recommended for board-level insight and governance:

NCSC Cyber Assessment Framework (CAF)

The Cyber Assessment Framework (CAF) developed by the UK’s NCSC is tailored for essential services and critical infrastructure organisations. It offers a comprehensive set of 14 high-level cyber security principles that OES companies must implement itgovernance.co.uk. These principles are grouped under four overarching objectives – Managing Security Risk, Protecting Against Cyber Attack, Detecting Security Events, and Minimising Impact of Incidents tgovernance.co.uk. Each principle (such as Governance, Asset Management, Network Security, Incident Response, etc.) is broken down into detailed outcomes and “indicators of good practice.” Regulators use the CAF as a baseline to audit compliance with NIS Regulations itgovernance.co.uk. From a board perspective, the CAF is extremely valuable: it translates cybersecurity into business-focused areas that directors can inquire about. For example, Objective A (Managing Security Risk) includes principles on governance and supply chain – a board can ask management for evidence of a cybersecurity risk register and how third-party risks are handled itgovernance.co.uk. Objective D (Minimising Impact) covers incident response plans and continuous improvement – boards can seek assurance that robust incident response and recovery plans are in place and tested digital.nhs.uk. Many Boards use CAF self-assessment scores to track their organisation’s cyber maturity over time. In summary, the NCSC CAF provides a common language between technical teams and the Board, ensuring that nothing important (from policies to technical controls) is overlooked in protecting critical assets.

International Standards and Best Practices (ISO 27001, NIST CSF, etc.)

Beyond the CAF, there are international frameworks that PLCs often adopt as part of their cybersecurity strategy. ISO/IEC 27001 is a globally recognized standard for Information Security Management Systems (ISMS). It outlines how to establish a risk-based security program, including requirements for risk assessment, security controls selection, training, and continuous improvement. Achieving ISO 27001 certification can give the Board and stakeholders confidence that the organisation follows industry best practices for protecting data. It also dovetails with regulatory compliance – many controls in ISO 27001 help meet NIS and GDPR obligations (for instance, access control, incident handling, encryption). Boards should consider ISO 27001 as a way to impose governance discipline around cybersecurity; the standard requires top management involvement, internal audits, and management reviews, which inherently brings cybersecurity into the boardroom on a routine basis. Another widely used framework is the NIST Cybersecurity Framework (CSF) (originally from the U.S. National Institute of Standards and Technology). NIST CSF is not a certification, but a voluntary guidance that organises security activities into five core functions – Identify, Protect, Detect, Respond, Recover. Many UK organisations map their security initiatives to the NIST functions as it provides an intuitive model for coverage and balance. Boards may find NIST’s simplicity helpful in asking “Are we doing all the things we should be doing across identification, protection, detection, etc.?”

Additionally, the UK has its own basic standard – Cyber Essentials – a government-backed certification for basic cyber hygiene (covering firewalls, secure configuration, access control, malware protection, patch management). While Cyber Essentials is more aimed at smaller organisations, Boards of larger PLCs often ensure their key suppliers have it, and it represents a minimum baseline for the company itself.

Crucially, adopting a framework is not a one-time task but part of a risk management cycle. Boards should ensure that management is continuously assessing cyber risks (threats and vulnerabilities), treating them with controls aligned to one of these frameworks, and regularly reviewing effectiveness slaughterandmay.com. For example, a risk assessment might identify “ransomware infection” as a top risk; using NIST or ISO controls, the firm would implement defenses (like user training, network segmentation, backups), and the Board would get updates on risk levels and control effectiveness over time. By aligning with recognised frameworks, organisations create structured reporting that boards can more easily digest – e.g. heatmaps of risk, compliance scores, or audit findings mapped to the framework. In essence, frameworks such as the NCSC CAF and ISO 27001 provide the Board with assurance that cybersecurity is being managed in a rigorous, industry-standard way. They also offer a means for boards to benchmark their organisation’s cyber posture against peers and regulatory expectations bridewell.com.

Governance Responsibilities of Boards in Cybersecurity

Cybersecurity is not solely the domain of IT departments – it is a core governance issue that company boards must actively engage with. Recent UK guidance (including updates to the UK Corporate Governance Code) makes clear that boards are expected to own the oversight of cyber risk as part of their fiduciary responsibilities slaughterandmay.com. Several key areas define the Board’s governance role in cybersecurity:

Setting Risk Appetite and Integrating Cyber into Risk Management

It is the Board’s role to determine the nature and extent of risks the organisation is willing to take in pursuit of its objectives – this includes cyber risk slaughterandmay.com. Boards should explicitly discuss and agree on the company’s risk appetite for cybersecurity. For example, a board might decide it has zero tolerance for risks that could endanger human life or critical services, but a moderate appetite for certain low-impact cyber risks. This risk appetite should then inform management’s priorities and investments in security. The Financial Reporting Council’s guidance advises boards to treat cyber as a principal risk and ensure it is folded into enterprise risk management alongside financial, operational, and strategic risks slaughterandmay.com. In practice, this means the Board should: review and approve the organisation’s cyber risk assessments, ensure key cyber risks (such as prolonged downtime of an essential system or breach of sensitive data) appear on the corporate risk register, and require management to present mitigation plans for those risks. Regular board agendas should include cyber risk updates, just as they include financial performance or audit findings bridewell.combridewell.com. If the company has a Risk Committee or Audit Committee, cyber should be a standing item there as well. Ultimately, tone from the top matters – when boards demonstrate that cybersecurity risk management is taken seriously, it cascades through management levels, encouraging a proactive security culture.

Crisis Preparation and Incident Response Oversight

Boards carry responsibility for how the organisation prepares for and handles cyber crises. A major cyber incident (such as a successful ransomware attack or a large data breach) can rapidly escalate into an enterprise-threatening event, so the Board must ensure that response and continuity plans are in place before an incident occurs. This involves reviewing whether management has an up-to-date Incident Response Plan and a Business Continuity/Disaster Recovery Plan that covers cyber scenarios digital.nhs.uk. Directors should ask when these plans were last tested – for example, has the organisation conducted a crisis simulation or “wargame” involving a cyber attack? Frequent exercises are crucial so that both executives and the board know their roles during an incident. In a serious incident, the Board (or a subset, such as the Chair and an IT-savvy Non-Executive Director) may need to convene at short notice to make critical decisions, such as approving communications to customers/regulators, deciding on paying a ransom (or not), and allocating emergency funds/resources to response efforts. The Board should also insist on post-incident reviews for any significant cyber event: understanding what went wrong, what was done well, and what improvements will be made. An example of good practice is having a communication protocol: if a breach occurs, the CISO or CIO should notify the CEO and Board within a predefined time frame, ensuring no delays in escalation. Regulators will expect senior management and boards to be involved in incident management, especially for critical infrastructure – under NIS, for instance, notifying authorities of an incident is mandatory, and the board should be aware of such reports. By overseeing crisis preparedness, Boards not only mitigate impact but demonstrate accountability and due diligence, which can be favorable in the eyes of regulators and the public during the aftermath of an incident.

Accountability, Leadership and Cyber Culture

The Board is ultimately accountable for the organisation’s cybersecurity posture. This accountability is increasingly being codified – as noted, frameworks like NIS2 even threaten personal liability for board members in the event of gross failings nccgroup.com. In the UK, while personal legal penalties for directors in cyber matters are not yet common, directors do have duties under the Companies Act to exercise reasonable care, skill, and diligence. Ignoring cyber risks could be seen as a breach of those duties if it leads to significant harm. Therefore, boards must provide informed leadership on cybersecurity. This could mean appointing a board-level champion for cyber (some companies designate a Non-Executive Director with IT/cyber expertise to lead discussions with management). The board should also ensure the CISO has a voice at the top table – either the CISO reports directly to the board or to a senior exec who regularly brings the CISO into board meetings. Good governance might involve inviting the cybersecurity team to present to the board at least quarterly.

Another aspect is fostering a positive cybersecurity culture throughout the organisation. The board sets the tone: if directors emphasise the importance of security (for instance, by ensuring adequate budget for it, and by holding management accountable for security outcomes), employees and middle managers are more likely to follow suit. The NCSC’s Board Toolkit highlights the need for boards to embed cyber security in organisational culture and to grow cyber expertise at all levels ncsc.gov.uk. This can involve sponsoring company-wide awareness initiatives or training programs (even Board members themselves should undergo basic cyber awareness training to understand phishing, social engineering, etc.). Boards should also consider cyber risk in strategic decisions – for example, during mergers and acquisitions, doing due diligence on the cyber security of target companies (lack of due diligence in M&A was a lesson from the Marriott data breach case) edpb.europa.eu. By weaving cyber into strategic planning, boards reinforce that security is an enabler of business resilience, not an IT afterthought.

In summary, the governance responsibility of Boards is to lead from the front on cybersecurity. That means setting clear expectations (risk appetite and policies), ensuring preparedness (resources and plans for incidents), and taking accountability (through regular oversight and cultural influence). As one cybersecurity expert put it, cyber risk “is ultimately a corporate governance issue” and not just an IT problem slaughterandmay.com. Boards that embrace this role will steer their organisations to better resist and recover from the cyber threats that come their way.

Boardroom Engagement: Key Questions Directors Should Ask

One of the most practical steps Board members can take is to regularly engage management with pointed questions about cybersecurity. By asking the right questions, directors can stimulate productive discussion, uncover gaps, and ensure they get the insight needed to fulfill their oversight duties ncsc.gov.uk. The NCSC encourages boards to use questioning as a tool to evaluate their organisation’s cyber risk profile ncsc.gov.uk. Here is a list of key questions that Boards of critical infrastructure PLCs should be asking their CISOs, CIOs, and executive teams:

  • What are our most critical information assets and systems, and how are we protecting them? (Do we know our digital “crown jewels” and have we prioritized their defence? thecorporategovernanceinstitute.com)

  • How do we defend our organisation against phishing and other common cyber attacks? (Phishing is a top entry method for attackers – are we filtering emails, training staff, and using measures like DMARC to prevent spoofing? serviceteamit.co.uk)

  • Do we control and monitor the use of privileged accounts? (Administrator accounts hold the keys to the kingdom – what extra protections are in place to prevent misuse or compromise of these powerful accounts? digital.nhs.uk)

  • Are our software and systems kept up-to-date with security patches? (Boards should hear about patch management performance. How do we handle legacy systems that can’t be patched? digital.nhs.uk)

  • What cyber security measures do we require of our suppliers and partners? (Third-party risk: How do we ensure partners who connect to our networks or handle our data are securing it properly? digital.nhs.uk)

  • What authentication methods are we using to control access? (Are we relying on passwords alone, or do we have multi-factor authentication in place for critical systems and remote access? digital.nhs.uk)

  • Do we have the right cybersecurity skills and culture internally? (Is our security team appropriately staffed and skilled digital.nhs.uk? Are we doing regular security awareness training for all employees digital.nhs.uk?)

  • What are our top cyber risks, and how are we managing and mitigating them? (Ask management to articulate the highest risks on the cyber risk register and report on progress of risk treatments. This should align with the board-approved risk appetite.)

  • Do we have robust offline backups and have we tested restoring from them? (This question addresses ransomware resilience – secure, offline backups are essential to recovery digital.nhs.uk.)

  • When was our cyber incident response plan last updated and exercised? (Boards should know that the organisation can react under pressure. Have we done a drill in the last 6-12 months? What were the lessons learned?)

  • How do we measure our cybersecurity effectiveness? (What key performance indicators or metrics – e.g. incident counts, mean time to detect/respond, compliance scores – are we tracking to gauge improvement or deterioration in security?)

  • Are we in compliance with relevant regulations and standards? (Are we meeting NIS requirements, GDPR duties, and following frameworks like the NCSC CAF or ISO 27001? Any gaps identified by audits that the Board should know about?)

  • What keeps our security team up at night – in other words, what emerging threats or vulnerabilities are we most concerned about? (This encourages candid discussion of things like new ransomware strains, supply chain vulnerabilities, or recent incidents in our industry that might foreshadow something.)

These questions (and others like them) should not be one-off inquiries. Boards are encouraged to make cybersecurity a standing agenda item and to rotate through a set of questions at each meeting, drilling deeper as necessary. The goal is to drive a two-way dialogue: management provides assurance and insight to the board, and the board provides challenge and strategic direction on cybersecurity. By regularly asking such questions, directors signal that cybersecurity is a priority and ensure that they “know enough about cyber security to discuss issues with key staff” ncsc.gov.uk, as the NCSC advises. This active engagement ultimately leads to better-informed decisions and a stronger security posture.

Case Studies: Cyber Incidents and Lessons Learned

Examining real-world cyber incidents can provide valuable lessons for Boards and management. Below are several case examples – both UK and global – that highlight the impacts of cyber attacks on critical infrastructure and underscore key takeaways for governance:

  • Colonial Pipeline Ransomware Attack (USA, 2021): In May 2021, ransomware crippled IT systems at Colonial Pipeline, the operator of a major fuel pipeline on the US East Coast. Fearing the attack might spread to operational technology, the company halted all pipeline operations for multiple days industrialcyber.co, causing fuel shortages in several states. Ultimately Colonial Pipeline paid a ransom of ~$4.4 million in Bitcoin to the criminal group DarkSide industrialcyber.co. The incident demonstrated how a cyber attack on a single company can trigger national infrastructure disruption. Lessons learned: Boards should verify that IT and OT networks are properly segmented to contain malware spread industrialcyber.co. Incident response plans must consider worst-case scenarios (e.g., shutting down operations) and the business continuity implications. This case also raised the issue of ransom payments – organisations should define their stance on paying ransoms as part of their crisis strategy (Colonial’s board approved payment to quickly restore service, but the decryption tool was slow industrialcyber.co). It’s a reminder to have reliable backups and recovery processes so that paying ransom is not the only resort. Government and regulatory scrutiny post-incident was intense; hence boards should expect high transparency and communication duties if their company is involved in critical supply disruptions.

  • NHS WannaCry Attack (UK, 2017): The WannaCry ransomware outbreak hit dozens of countries, but the UK NHS was notably impacted due to unpatched systems. Within a day, 34% of NHS trusts in England experienced disruption – many had to revert to manual processes as IT systems were inaccessible nao.org.uk. An estimated 19,000 hospital appointments and operations were cancelled as a direct resultnao.org.uk, and some emergency patients were rerouted to other hospitals. Fortunately, no ransom was paid; a security researcher’s kill-switch halted the malware’s spreadnao.org.uk. Lessons learned: This attack underscored the peril of unpatched vulnerabilities – the NHS had been warned in advance to patch a known Windows flaw, but compliance was inconsistent nao.org.uk. Boards must ensure that basic cyber hygiene (like timely patching and upgrading of unsupported software) is enforced and audited, especially for critical systems nao.org.uk. WannaCry also highlighted that lack of network isolation can turn a single infection into an enterprise-wide outage – segmenting networks can prevent malware in an admin office PC from knocking out an MRI scanner network, for example. Another lesson is the importance of preparedness and national coordination: the NHS had to learn in real-time how to manage a cyber crisis across multiple sites. Boards in the healthcare sector (and beyond) should advocate participating in sector-wide cyber exercises and collaborating with national cybersecurity agencies (like NCSC) for early warning and support. The reputational impact of WannaCry on the NHS also taught boards about communication – transparent public communication and patient safety focus helped maintain trust during the recovery.

  • Southern Water Breach (UK, 2023-24): In early 2024, Southern Water (a regional water utility) confirmed that cyber criminals had infiltrated its IT systems, stealing data from a portion of its servers industrialcyber.co. The Black Basta ransomware gang claimed responsibility, known for attacking critical infrastructure bleepingcomputer.com. Southern Water assured that water supply and treatment operations were not affected, limiting the incident to IT and data loss. However, personal data of up to 5-10% of customers was compromised industrialcyber.co, and the company incurred £4.5 million in response costs during that year bleepingcomputer.com. Regulatory authorities and the media were alerted, and the company had to notify affected customers. Lessons learned: This case shows that even if core operations stay online, a cyber breach can carry significant financial costs and reputational damage. Boards should take note that crisis expenses – from hiring external cyber experts and lawyers to customer care and potential fines – can run into millions for a single incident bleepingcomputer.com. Cyber insurance can offset some costs, but policies often require that certain security measures were in place, so boards must ensure compliance with policy conditions. Another lesson is about public communication: Southern Water had to manage customer concerns about data and service. Boards should have a communication plan for cyber incidents that covers public statements, media handling, and support for customers or stakeholders put at risk. This incident also underlines that critical infrastructure companies are squarely in ransomware gangs’ sights, contradicting any assumption that nation-state attacks are the only worry for utilities. Board oversight should therefore address both nation-state threats and organized crime – the latter often aiming to steal data for extortion, as happened here. Finally, Southern Water’s experience emphasizes the value of resilience in IT systems – had the attackers succeeded in encrypting operational technology, the impact could have been far worse (e.g., water supply interruption). It is a prompt for boards to verify that essential service delivery can continue even if corporate IT is taken down, through network separation and manual fallbacks.

  • Colonial Pipeline, WannaCry, and other incidents – common themes: Across these cases (and others like the 2021 Irish Health Service (HSE) ransomware or the 2017 NotPetya attack that hit shipping giant Maersk), common lessons emerge. First, basic security gaps (unpatched systems, weak credentials, etc.) often provide the foothold for major attacks – boards must push for excellence in the security fundamentals. Second, the ripple effect of attacks can extend beyond the breached company, affecting economies and citizens; thus critical infrastructure boards carry a broader stewardship responsibility. Third, a swift and effective response is critical: organisations that had practiced and prepared (Maersk famously rebuilt its network within days due to extraordinary disaster recovery efforts) recovered faster and protected their reputation. Lastly, leadership matters – when boards and executives lead a transparent, customer-focused response, the organisation often emerges more trusted. For instance, companies that handled incidents well by promptly informing customers, cooperating with authorities, and taking remedial action have often seen their reputation recover. Boards should study these cases to ask, “If this happened to us tomorrow, are we confident we would manage it as well as possible?” If the answer is no, further investment and preparation are warranted.

Conclusion

Cybersecurity in critical infrastructure is not just a technical issue, but a strategic business imperative. For UK PLCs in sectors like energy, transport, finance, healthcare, and water, robust cybersecurity can literally be the difference between sustained operations or nationwide disruption. This white paper has outlined the evolving threat landscape – from state-sponsored espionage to relentless ransomware – and the vulnerabilities that adversaries seek to exploit. It has also highlighted the regulatory environment pressing boards to act, the frameworks that can guide risk management, and the governance practices needed to embed cybersecurity into corporate DNA. The overarching message for Boards of Directors is clear: cybersecurity must be owned at the top. By asking probing questions, setting strong expectations, and supporting their teams in building resilience, Boards can significantly reduce cyber risk to their organisations and the essential services they provide.

Ultimately, good cyber governance is now part of good corporate governance. A cyber crisis can rapidly become a business crisis, so preparedness and oversight are as much a Board responsibility as financial auditing or legal compliance. The discussion questions provided are a starting point for boardroom dialogue, and the case studies serve as cautionary tales and learning opportunities. Going forward, Boards should foster a culture where cybersecurity is viewed as everyone’s responsibility – from the server room to the boardroom. In doing so, UK critical infrastructure PLCs will not only better defend against those who seek to do harm, but also ensure they can continue to deliver their vital services safely in the digital age.

Sources:

  1. UK Government – Cyber Security and Resilience Policy Statement gov.uk

  2. NCSC Annual Review 2024 – Threat Landscape for CNI ncsc.gov.uk

  3. Financial Reporting Council – Guidance on Risk Management (UK Corporate Governance Code, 2024) slaughterandmay.com

  4. NCSC Cyber Assessment Framework Principles (IT Governance summary) itgovernance.co.uk

  5. Information Commissioner’s Office – NIS Guidance on Penalties ico.org.uk; GDPR Fine Powers edpb.europa.eu

  6. Simply NUC – UK Cyber Resilience Bill and NIS2 Alignment simplynuc.com

  7. Bridewell Consulting – Board Cybersecurity Priorities (2025) bridewell.com

  8. NHS England – Board Questions on Cyber Security (NCSC Toolkit) digital.nhs.uk

  9. Industrial Cyber – Critical Infrastructure Attacks in 2024 industrialcyber.co

  10. BleepingComputer – Southern Water Breach Cost (2025) bleepingcomputer.com

  11. National Audit Office – WannaCry NHS Impact Report nao.org.uk