Blog of cyber
In June 2024, 77 entities, including 10 French banks, fell victim to a remote access Trojan called "DroidBot." Resold to cybercriminal networks, more than 776 infections were detected in Western Europe within banking organizations, cryptocurrency platforms, and financial companies.
The urgent need to deploy security and operational resilience solutions on a European scale, particularly in the financial sector, is becoming crucial. This is the role of the European DORA (Digital Operational Resilience Act) regulation, designed to strengthen the ability of financial entities to deal with cyber threats.
Coming into force in January 2025, DORA marks a major step forward by unifying ICT risk management (Information and Communication Technology) in the financial sector at the European level. It requires better risk control, efficient incident management, and better assessment of ICT service providers.
DORA, or the Digital Operational Resilience Act, is a European regulation designed to strengthen the digital operational resilience of financial entities. The DORA regulation establishes a common framework for member countries for managing cyber and ICT risks in financial entities. It came into force on January 17, 2025.
The DORA regulation has several objectives:
DORA applies to all financial entities in Europe defined in Article 2 :
An important aspect of DORA concerns third-party ICT service providers, particularly those considered "critical." These providers are those whose services may have a systemic impact on the stability, continuity, or quality of financial services in the European Union.
DORA imposes a strengthened supervisory framework for these providers, including:
These provisions ensure that financial entities exercise adequate control over the risks associated with the use of ICT services provided by third parties. They also ensure that these providers comply with the security and operational resilience standards required by DORA.
By minimizing the potential risks associated with dependence on these third-party providers, DORA helps maintain the stability of the financial system.
The DORA Regulation sets out the digital operational resilience requirements applicable to financial entities across the European Union. These obligations are structured around four main themes:
The scope of payment-related risks is now governed by the DORA Regulation. The classification criteria is defined in the RTS and all incidents (operational or security) must be reported.
Management of third-party ICT service providers: the DORA regulation sets out two approaches to third-party risk management:
→ for financial entities: measures taken to limit the risks associated with ICT providers;
→ for ICT service providers: supervision by European authorities.
Held liable in the event of failure, the financial entity must protect itself against third-party risks by ensuring that outsourced contracts are compliant and recorded in an information register. This approach must be part of a third-party risk management (Third Party Cyber Risk Management), particularly for third-party ICT service providers deemed critical.
Particular attention is paid to the subcontracting chain. Two additional requirements supplement the initial framework:
Finally, supervisory authorities encourage the voluntary sharing of operational information on cyber threats and vulnerabilities (CVE). This voluntary reporting helps to improve collective knowledge of risks and strengthen the operational resilience of the banking and financial sector.
DORA (Digital Operational Resilience Act) and NIS 2 (Network and Information System Security Directive) are two European regulatory frameworks designed to strengthen the security and resilience of IT systems across the European Union. For CIOs, RSSIs, and CISOs, these two texts are fundamental, and their legal structure can sometimes be difficult to distinguish.
| DORA | NIS 2 | |
|---|---|---|
| Objectives | DORA focuses specifically on digital operational resilience in the financial sector. Its aim is to ensure that financial institutions continue to operate without major disruption in the event of ICT incidents. | NIS 2 aims to secure critical infrastructure against external threats and improve cybersecurity in various sectors by harmonizing security standards. |
| Legal scope | DORA is a regulation that applies exclusively to financial entities and their third-party ICT service providers.. | NIS 2 is a directive that must be transposed into each Member State. This new version covers 18 new sectors (versus 7). It covers governance, cyber risk management measures, IT compartmentalization, incident reporting obligations, supply chain security, and more. |
| Requirements |
|
|
For the financial sector, the question arises: which takes precedence?
We must rely on the Lex specialist principle: specific laws take precedence over general laws. DORA must be prioritized.
Implementing DORA requires a structured and proactive approach. Compliance cannot be improvised. Here are the key milestones to follow in order to approach DORA with confidence and strengthen operational resilience.
1/ Assessment and gap analysis: the first step is to conduct a thorough risk assessment and analysis of the gaps between current practices and the requirements imposed by the regulation:
2/ Implementation of a risk management framework, particularly for ICT ****:
3/ Team awareness and training: improving compliance requires awareness and adoption of new requirements to be implemented on a daily basis by teams:
4/ Use experts and technology: to facilitate and accelerate DORA compliance:
5/ Data availability, authenticity, protection, and confidentiality: data represents the major risk and is the gateway to cyberattacks:
DORA compliance directly affects the areas of cybersecurity and operational resilience. Board of Cyber offers a range of solutions to support cyber and compliance teams in achieving DORA compliance.
These solutions are structured around four main areas.
Our Trust HQ solution enables CISOs to publish their security policy (PSSI) and reconcile it with the applicable regulatory frameworks. Our solution collects relevant data and information on security policies. Detailed reports show you where your company is non-compliant. Action plans can then be defined and managed directly from the solution. The ISSP is always up to date and its internal distribution is simplified.
Assess your digital resilience Our Securty Rating assesses an organization's cyber performance. It analyzes the company's assets in a non-intrusive manner and provides a comparison with other organizations in your sector. Security Rating measures cyber security maturity across six areas (asset assessment, access management, data security, network security, application security, and operational security). The continuous rating scale from 0 to 1000 allows you to monitor your cyber performance. In addition, Security Rating provides detailed explanations of the issues detected. Reports with visual dashboards and graphs can be shared with the executive committee and purchasing management. They can quickly understand the risks to which the company is exposed. For a CISO, this data provides a comprehensive overview of the risks. Operational teams can use the recommendations and concrete measures proposed by the solution.
Evaluation of ICT service providers
Managing risks related to ICT service providers is a central aspect of DORA. Board of Cyber helps organizations set up and manage dedicated programs, including due diligence and service contract reviews to ensure full compliance with DORA regulations.
Our Trust HQ solution enables audit campaigns to be carried out and evidence to be gathered from suppliers. This avoids email exchanges and shared spreadsheets, which are sources of oversights and handling errors. This data is then processed by Security Rating to obtain a rating for your third parties. Shared dashboards and alerts indicate risk levels, especially in the event of a downgrade.
As an ICT service provider, Board of Cyber relies on qualifications and certifications to guarantee the compliance of our solutions. As such, we are SecNumCloud certified by ANSSI, attesting to the security, robustness, and reliability of the solutions used by our customers.
Our tools automatically generate reports that comply with regulatory requirements (RTS). In addition, cyber/compliance teams can access detailed and operational reports to manage their digital resilience. As part of a continuous improvement process, these reports can also be shared with suppliers who are subject to audits or controls.
The DORA regulation is a major step forward in strengthening cybersecurity and digital operational resilience in the European financial sector. It requires continuous ICT risk management, incident reporting, resilience testing, and third-party vendor control.
Organizations must assess their current practices in order to define robust risk management frameworks and raise awareness among their teams. Calling on experts, such as those at Board of Cyber, can provide clarity on the requirements imposed by DORA and how to comply with them.
The *DORA regulation applies to a wide range of financial entities, including:
In total, this concerns 20 types of financial entities.
The ICT risk management framework imposed by the DORA Regulation is based on several key elements:
The DORA regulation requires financial entities to integrate the risks associated with third-party ICT service providers into their risk management framework. To do so, they must:
In addition, entities must:
Under the DORA Regulation, financial entities must notify the competent authorities of major ICT incidents. This includes: