No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Financial Services

New EU Rules on Digital Resilience Are Coming Soon; Are You Ready?

Finserv organizations, including some in U.S., and technology vendors face rules around cyber attacks, natural disasters & other disruptions

by Jag Lamba
July 22, 2024
in Financial Services
flags at eu

Certa’s Jag Lamba explores steps organizations need to take to comply with the EU’s upcoming DORA rules that seek to strengthen the backbone of the financial sector.

On Jan. 17, 2025, the European Union’s latest regulation to strengthen the backbone of the financial sector will come into full force. The EU’s Digital Operational Resilience Act (DORA) was passed in 2022 and we’ve seen the slow rollout of the rules and regulations that financial firms must follow. Organizations will be expected to implement specific policies, practices and internal controls that will help the financial sector as a whole stay operational even in the face of cyberattacks, natural disasters and other disruptions.

DORA emphasizes due diligence, contract management, incident response and continuity planning. As a result, complying with its rules will in some cases require organizations to reevaluate their vendor contracts, cybersecurity protocols and data management tools.

While DORA is aimed squarely at financial institutions — banks, credit card providers, insurance firms, broker-dealers, crowdfunding platforms, cryptocurrency services and the like — it isn’t solely those in the finance sector who need to pay attention. The act’s focus on digital resilience and cybersecurity, along with its stipulations on third-party management, means that a number of technology firms will find themselves going through the DORA process themselves if they sell to or work with the financial world. This can include cloud providers, IT outsourcing firms, cybersecurity companies, data center operators, managed service providers and more.

Companies don’t need to be headquartered in the European Union to be subject to DORA regulations, either. Any financial organization with customers in those countries or otherwise doing business related to the financial sector in the EU must comply.

Article 6, Section 8 of DORA requires that each company have a “sound, comprehensive and well-documented ICT [information and communication technology] risk management framework” that includes a “a digital operational resilience strategy.” 

DORA-proof your organization

Define tolerance for ICT risk and overall risk appetite

Every venture involves risk — it’s unavoidable. What does change from business to business is the level of risk that an organization deems acceptable as part of doing business. That risk can change depending on many factors, most notably the category of risk. DORA requires businesses to define their acceptable parameters of risk for their operation — ICT and disruption risks in particular. Every other aspect of the company’s risk management framework needs to be in line with the defined risk appetite. In other words, if a risk goes beyond the comfortable range, there should be a defined plan in place for how it will be dealt with.

Set clear information security objectives

The next step is to identify and document the data security objectives that line up with both the risk appetite defined above and also the company’s broader business goals and needs. What type of information is most in need of safeguarding? What are the likely attack vectors that malicious actors would go after?

This step is about setting baselines for success when it comes to reducing digital and third-party risks. As such, the objectives should be meaningful to the day-to-day operations and measurable so it’s easy to determine if they’re met. And finally, companies should only set objectives that they’re willing to pursue; committing to more than a company can or will follow through is likely to waste resources or create a misalignment with security goals and expectations.

small plant budding in cracked soil
Compliance

Globally, Regulators Are Making It Clear: FinServ Firms Must Become Resilient

by Rich Cooper
July 24, 2023

The relentless upheaval of the past few years has uniquely affected the global financial services sector. And regulators are responding.

Read moreDetails

Outline mechanisms for incident detection, prevention and protection

With objectives in place, it’s time for organizations to outline the specific tools and processes that will be used to deal with attacks or disruptions. DORA also stipulates that the resilience strategy should explain the current ICT architecture in place at the business and any changes that must take place in order to utilize those tools or procedures that will help secure the digital environment.

Then, it’s time to put those plans into practice. Detection, prevention, protection and mitigation are the key categories here, and each should be sufficiently addressed. Powerful cybersecurity tools are an important piece of the puzzle, but it’s important not to overlook the role of third-party vendors and partners in this step. DORA is particularly concerned with third-party risk, so this is a crucial time to perform due diligence around vendors’ operational resilience, regulatory compliance and current security postures.

Many financial institutions and vendors supporting them are focusing on building out data maps to help meet DORA compliance by January. This is a function of TPRM systems that requires bringing in data from disparate systems where vendor data may reside — contract management, cybersecurity and customer service systems to name a few — and many legacy systems are being updated to enable this capability. A detailed map of the company and its vendor (and subcontractor) relationships will help illuminate where any crucial data may be and at the same time will make visible the dependencies that could threaten the financial organization if a disruption were to occur with a vendor.

Set and enforce expectations with strong contract management

DORA requires that all contracts with vendors have clearly defined roles and responsibilities, the types of mandatory resilience training required are laid out and stipulations on what subcontractors are permissible are in writing. Any contracts that don’t cover these items could put a company at risk of noncompliance. And there’s still one more contract detail that is perhaps the most important part of all: defined audit rights, which will be important when it comes to both regulatory reporting and incident recovery.

Develop a communications plan to be followed after any incidents

Defined audit rights make it possible for a company to gain insight into the key operational and security details of their vendors — something that has to be accounted for when reporting data to DORA regulators. Those regulators will be looking for such contract stipulations, and without them there’s no guarantee a vendor will provide needed information for an investigation after an attack or disruption. In fact, many would prefer to hide as much information as possible about that disruption to try to save face. Vendors found to be lacking in their ability to provide necessary data should be either brought up to speed or divested from quickly.

A clear communications plan that follows Article 14 of DORA must be in place. These plans must specify the “responsible disclosure” of major ICT-related incidents or vulnerabilities to parties that need to know, both internally and externally to the company. Article 14 also specifies that at least one individual needs to be in charge of implementing this communication strategy and serve as the public- and media-facing person for such matters.

Routinely test the resiliency program

Finally, the resiliency framework needs to be carefully tested. DORA’s Article 26 requires that companies perform a threat-led penetration test (TLPT) at least once every three years, and that test must cover the ICT systems that support vital business functions. It can’t just be a homemade TLPT test, either; Article 27 defines a valid test for DORA compliance as one that is run by an organization that is external to the one being tested, has demonstrated the required expertise and is approved by the relevant regulatory authority.

A new world for managing third-party risk

While the deadline for DORA compliance is coming up quickly — January 2025 — most of these aspects of an acceptable resilience strategy and risk management framework are not things that can be put together quickly. 

It’s important for companies that operate in or support the financial sector to start building the foundation for compliance today. Further DORA rules, likely around testing technical standards and incident reporting timelines, are set to be published in July, but that, too, is not worth delaying for — any such rules will be in addition to those above, so businesses will still need this strong foundation to build upon.


Tags: Cyber Risk
Previous Post

Functional Privacy: A New Concept to Simplify Legal Analysis

Next Post

Distributing High Compliance Training Into Customers’ Systems

Jag Lamba

Jag Lamba

Jag Lamba is the founder and CEO of Certa, a third-party lifecycle management platform for procurement, compliance and ESG. Certa is backed by Techstars and top global VCs. A Wharton and McKinsey alum, Jag lives in Saratoga, Calif., and loves hiking and playing soccer with his son.

Related Posts

news roundup green bars

In-House Counsel Salary Increases Slow

by Staff and Wire Reports
May 2, 2025

Majority of execs predict rise in fincrime in ’25

data abstract green purple

66% of CISOs Worry Cyber Threats Are More Advanced Than Companies’ Defenses

by Staff and Wire Reports
April 25, 2025

US business sector falling behind in adoption of renewable energy

robot hand pointing to sky

Agentic AI Can Be Force Multiplier — for Criminals, Too

by Steve Durbin
April 21, 2025

How polymorphic malware and synthetic identities are creating unprecedented attack vectors

data abstract pixelated

GenAI Adoption Surging in Professional Services

by Staff and Wire Reports
April 18, 2025

Fewer than 1 in 3 organizations consistently meet cyber compliance standards

Next Post
Rustici Distributing High Compliance Training

Distributing High Compliance Training Into Customers’ Systems

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights