In 2025, the definition of good corporate governance evolved—and cybersecurity is now central to it. While most boardrooms in the U.S. are still digesting SEC cyber disclosure rules, the United Kingdom has taken an even more assertive step, offering a glimpse into the regulatory future that may soon arrive stateside.
This article breaks down what’s happening in the UK, what it signals for U.S. boards, and what directors must do now—especially if they oversee global operations.
A New Standard for Cyber Accountability in the UK
The UK Government recently released a major update to its Cyber Governance Code of Practice, and followed it with a Cyber Security & Resilience Bill Policy Statement in April 2025. Together, these developments reframe cybersecurity not as a technical obligation, but as a board-level governance responsibility.
Key implications of the UK changes:
- Cybersecurity is now treated as a strategic risk, on par with financial and legal risks.
- Boards are expected to have clear structures for oversight, with defined roles, reporting, and escalation procedures.
- Directors may be personally accountable for failing to ensure adequate cyber resilience.
- The UK is signaling a shift from check-the-box compliance toward operational readiness and demonstrable oversight.
While these updates apply to UK entities, their ripple effect will be felt far beyond British shores.
What This Means for U.S. Boards
Although the UK and U.S. operate under different regulatory regimes, the direction of travel is unmistakable. These developments serve as early indicators of the rising expectations globally—and they offer a preview of where U.S. governance standards may be headed.
Four reasons U.S. boards should pay close attention:
- Regulatory Convergence Is Real From the SEC’s cybersecurity disclosure rules to NIST CSF 2.0’s new “Govern” function, U.S. frameworks are increasingly aligned with UK-style expectations: cyber is a board issue, not just an IT one.
- Personal Liability Is Spreading The UK’s model of board accountability echoes the rising concern in the U.S. around director liability following cyber incidents—especially when oversight is found to be lacking.
- Shareholders and Insurers Are Watching Directors are now expected to show active engagement, not just passive interest. If the board isn’t asking the right questions—or documenting oversight—litigation and reputational risk rise sharply.
- The “Proof of Oversight” Era Has Begun Governance is no longer about asking one or two cybersecurity questions per year. Boards are now expected to engage consistently, measure impact, and maintain records of how decisions were made.
What If You Have UK Operations?
For U.S. companies with UK-based subsidiaries or operations, the impact of these changes is direct—not theoretical.
If your organization owns or controls a business registered in the UK—even as a separate legal entity—the UK Cyber Governance Code likely applies to you. That means:
- You may have directors in the UK who are now subject to enhanced duties.
- Regulators may expect cross-border alignment on cybersecurity strategy and governance.
- Any failure in the UK unit could create operational, reputational, or legal exposure for the U.S. parent.
Even if you maintain structural separation, cybersecurity weaknesses can easily cascade across regions, especially when systems, vendors, or data are integrated.
Boards should be asking:
- Do we know which of our entities fall under the UK code?
- Are we providing adequate board-level oversight of cyber risk globally?
- Could a breach or regulatory action in the UK affect our U.S. operations or financials?
The UK’s 2025 update is more than a local reform—it’s a signal. One that boards around the world should take seriously.
A Quick Word on AI & Software Security: Governance Expanding Fast
In May 2025, the UK doubled down on cyber governance by releasing two complementary—but distinct—codes: one for AI cybersecurity and one for software security. Both signal that regulators are no longer viewing cybersecurity as a monolithic risk.
Instead, boards are being asked to consider:
- Is your organization developing, purchasing, or integrating AI systems?
- Are software supply chain vulnerabilities—from open-source libraries to third-party tools—being governed with the same rigor as financial vendors?
- Are you overseeing AI-specific risk the same way you now oversee ransomware or data breaches?
These codes aren’t yet binding, but like the Cyber Governance Code, they represent the next frontier of board-level cybersecurity responsibility.


