{"id":153,"date":"2024-11-18T08:33:54","date_gmt":"2024-11-18T08:33:54","guid":{"rendered":"https:\/\/cyberriskpartners.net\/?p=153"},"modified":"2024-12-04T06:33:10","modified_gmt":"2024-12-04T06:33:10","slug":"dora-blog-2","status":"publish","type":"post","link":"https:\/\/cyberriskpartners.net\/en_gb\/dora-blog-2\/","title":{"rendered":"DORA blog series #2"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">#\ud835\udfee \ud835\uddd4\ud835\uddff\ud835\uddf2 \ud835\ude06\ud835\uddfc\ud835\ude02 \ud835\uddd7\ud835\udde2\ud835\udde5\ud835\uddd4 \ud835\uddfc\ud835\uddff \ud835\udde1\ud835\udddc\ud835\udde6\ud835\udfee?<\/h2>\n\n\n\n<p class=\"\">News outlets have widely covered the Network and Information Security Directive (NIS2) recently, as the compliance deadline was on the 17<sup>th<\/sup> October 2024.&nbsp; However, only a handful of European Union member states have integrated the NIS2 directive into the national legislature \u2013 so, another soft deadline.<\/p>\n\n\n\n<p class=\"\">NIS2 covers obviously critical services (power, water, healthcare etc.), but also the wider ecosystem required to sustain a society in a disaster scenario, such as large-scale food providers.&nbsp; NIS2 explicitly excludes financial institutions.&nbsp;<\/p>\n\n\n\n<p class=\"\">The Digital Operational Resilience Act (DORA) is solely focussed on the financial ecosystem, including organisations providing key ICT services to financial organisations.&nbsp; As DORA is a regulation, it does not need EU member states to perform further action to be legally binding.<\/p>\n\n\n\n<p class=\"\"><strong>\ud835\udde2\ud835\ude01\ud835\uddf5\ud835\uddf2\ud835\uddff \ud835\uddff\ud835\uddf2\ud835\uddf9\ud835\uddf2\ud835\ude03\ud835\uddee\ud835\uddfb\ud835\ude01 \ud835\uddd8\ud835\udde8 \ud835\uddf1\ud835\uddf6\ud835\uddff\ud835\uddf2\ud835\uddf0\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\ude00 \ud835\uddee\ud835\uddfb\ud835\uddf1 \ud835\uddff\ud835\uddf2\ud835\uddf4\ud835\ude02\ud835\uddf9\ud835\uddee\ud835\ude01\ud835\uddf6\ud835\uddfc\ud835\uddfb\ud835\ude00<\/strong><\/p>\n\n\n\n<p class=\"\">These include the Cybersecurity Regulation for EU institutions , the Cyber Solidarity Act for cross-EU collaboration and the Cyber Resilience Act for EU hardware \/ software products.<\/p>\n\n\n\n<p class=\"\">The General Data Protection Regulation (GDPR) covers data privacy, protecting EU citizen data from misuse. Most advanced countries outside of the EU have based their own privacy laws on GDPR.&nbsp; For example, Switzerland has created the Federal Act on Data Protection (FADP), with notably reduced fines for noncompliance.&nbsp;<\/p>\n\n\n\n<p class=\"\">Under GDPR, companies can be fined up to 4% of annual turnover.&nbsp; Meta, Amazon and Tik Tok have all been fined in the hundreds of millions of euros.&nbsp; Under FADP, an individual can be fined up to \u20ac250,000 and a company only \u20ac50,000 if an individual cannot be identified.<\/p>\n\n\n\n<p class=\"\"><strong>\ud835\uddd7\ud835\udde2\ud835\udde5\ud835\uddd4 <\/strong><strong>\ud835\uddee\ud835\uddfb\ud835\uddf1 <\/strong><strong>\ud835\uddf2\ud835\ude05\ud835\uddf6\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\uddfb\ud835\uddf4 <\/strong><strong>\ud835\uddd8\ud835\udde8 <\/strong><strong>\ud835\uddf3\ud835\uddf6\ud835\uddfb\ud835\uddee\ud835\uddfb\ud835\uddf0\ud835\uddf6\ud835\uddee\ud835\uddf9 <\/strong><strong>\ud835\ude00\ud835\uddf2\ud835\uddff\ud835\ude03\ud835\uddf6\ud835\uddf0\ud835\uddf2\ud835\ude00 <\/strong><strong>\ud835\uddff\ud835\uddf2\ud835\uddf4\ud835\ude02\ud835\uddf9\ud835\uddee\ud835\ude01\ud835\uddf6\ud835\uddfc\ud835\uddfb\ud835\ude00<\/strong><\/p>\n\n\n\n<p class=\"\">Financial organisations already deal with a significant number of regulations, which can detract from business priorities.&nbsp; If we can get a holistic view of the compliance landscape, we can become efficient in tackling the overlapping compliance requirements only once.&nbsp; Let\u2019s take the Payment Services Directive (PSD2) as an example.<\/p>\n\n\n\n<p class=\"\">PSD2 is focussed on making electronic payments efficient and secure.&nbsp; Payments is a subset of financial operations, so DORA has a significantly wider scope, however the security requirements are consistent.&nbsp; PSD2 and DORA both treat third parties as risks in end-to-end financial processing and therefore a consistent approach will be efficient.&nbsp; DORA covers reporting of all major ICT incidents, which will include the payment incident requirements of PSD2.&nbsp; As you can see, duplication of efforts to meet separate regulations is a waste of time and resources.<\/p>\n\n\n\n<p class=\"\"><strong>\ud835\uddea\ud835\uddf5\ud835\uddee\ud835\ude01 <\/strong><strong>\ud835\uddfb\ud835\uddf2\ud835\ude05\ud835\ude01?<\/strong><\/p>\n\n\n\n<p class=\"\">DORA will come into effect in January 2025 and will focus on three areas of cyber security which financial organisations will, no doubt, be performing to some degree: incident response, ICT risk and third-party risk management.&nbsp; Note, the risk management extends beyond cyber and will cover system redundancy and single-vendor risks.<\/p>\n\n\n\n<p class=\"\">Where DORA goes outside of traditional cyber security boundaries is in the area of operational resilience testing, blurring the lines with business continuity.<\/p>\n\n\n\n<p class=\"\">In my next post, we will explore what will change with regard to incident response, post January 2025.<\/p>\n\n\n\n<p class=\"\"><strong>#<\/strong><strong>\ud835\uddd7\ud835\udde2\ud835\udde5\ud835\uddd4 #<\/strong><strong>\ud835\uddf3\ud835\uddf6\ud835\uddfb\ud835\uddee\ud835\uddfb\ud835\uddf0\ud835\uddf2 #<\/strong><strong>\ud835\uddff\ud835\uddf2\ud835\uddf4\ud835\ude02\ud835\uddf9\ud835\uddee\ud835\ude01\ud835\uddf6\ud835\uddfc\ud835\uddfb #<\/strong><strong>\ud835\udde1\ud835\udddc\ud835\udde6\ud835\udfee #<\/strong><strong>\ud835\uddf1\ud835\uddf6\ud835\uddff\ud835\uddf2\ud835\uddf0\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2 #<\/strong><strong>\ud835\uddd8\ud835\udde8 #<\/strong><strong>\ud835\uddf0\ud835\ude06\ud835\uddef\ud835\uddf2\ud835\uddff #<\/strong><strong>\ud835\uddf0\ud835\ude06\ud835\uddef\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddf2\ud835\uddf0\ud835\ude02\ud835\uddff\ud835\uddf6\ud835\ude01\ud835\ude06<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/dora-finance.jpeg?resize=1024%2C1024&#038;ssl=1\" alt=\"\" class=\"wp-image-154\" srcset=\"https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/dora-finance.jpeg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/dora-finance.jpeg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/dora-finance.jpeg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/dora-finance.jpeg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/dora-finance.jpeg?resize=12%2C12&amp;ssl=1 12w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>#\ud835\udfee \ud835\uddd4\ud835\uddff\ud835\uddf2 \ud835\ude06\ud835\uddfc\ud835\ude02 \ud835\uddd7\ud835\udde2\ud835\udde5\ud835\uddd4 \ud835\uddfc\ud835\uddff \ud835\udde1\ud835\udddc\ud835\udde6\ud835\udfee? News outlets have widely covered the Network and Information Security Directive (NIS2) recently, as the compliance deadline was on the 17th October 2024.&nbsp; However, only a handful of European Union member states have integrated the NIS2 directive into the national legislature \u2013 so, another soft deadline. NIS2 covers obviously [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31],"tags":[],"class_list":["post-153","post","type-post","status-publish","format-standard","hentry","category-dora-regulation"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/posts\/153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/comments?post=153"}],"version-history":[{"count":2,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/posts\/153\/revisions"}],"predecessor-version":[{"id":163,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/posts\/153\/revisions\/163"}],"wp:attachment":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/media?parent=153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/categories?post=153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/tags?post=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}