{"id":147,"date":"2024-11-18T08:16:12","date_gmt":"2024-11-18T08:16:12","guid":{"rendered":"https:\/\/cyberriskpartners.net\/?p=147"},"modified":"2024-12-04T06:33:16","modified_gmt":"2024-12-04T06:33:16","slug":"dora-blog-1","status":"publish","type":"post","link":"https:\/\/cyberriskpartners.net\/es\/dora-blog-1\/","title":{"rendered":"DORA blog series #1"},"content":{"rendered":"<h2 class=\"wp-block-heading\"><strong>#1 Another European cyber regulation \u2026 not quite.<\/strong><\/h2>\n\n\n\n<p class=\"\">The Digital Operational Resilience Act (DORA) comes into force in January 2025 for financial entities operating in Europe, and their ICT suppliers.&nbsp; Whilst most are expecting a soft launch, being resilient is not a quick fix.<\/p>\n\n\n\n<p class=\"\">In this first post in my series on the DORA regulation, I\u2019ll cover the synergies and overlaps with existing frameworks and standards.<\/p>\n\n\n\n<p class=\"\"><strong>Frameworks and Standards<\/strong><\/p>\n\n\n\n<p class=\"\">All the common cybersecurity frameworks cover risk management, incident response and third-party risk management.&nbsp; NIST CSF 2.0 has a new Govern function, emphasising the importance of risk management within the organisational context.&nbsp; The implementation of ISO 27001 often requires organisations to rethink their risk management strategy, involving board and senior executives on the journey.&nbsp; The CIS18 framework covers Service Provider Management as a core control, even within the minimal Implementation Group (IG1).<\/p>\n\n\n\n<p class=\"\">Therefore, if your organisation aligns to, or is based upon, an existing cybersecurity framework, then you are on the right track for DORA compliance. &nbsp;The area you are most likely to need to mature is the risk management ownership at the most senior leadership level of the organisation.&nbsp; It is also not sufficient to discuss risks in general terms; risks should be linked to business processes with impact analysis performed to understand how disruptions will affect the business and what measures are in place to mitigate the risks.<\/p>\n\n\n\n<p class=\"\">Where existing frameworks are weak, is testing of an organisation\u2019s operational resilience.&nbsp; Testing within NIST, ISO27001 and CIS18 focusses on the organisation\u2019s defences, backups, awareness, software vulnerabilities and incident response.&nbsp; DORA goes a step further, outside the bounds of traditional cybersecurity and into Business Continuity Management.&nbsp; Therefore, the responsibility of DORA will not sit solely with the CISO.<\/p>\n\n\n\n<p class=\"\">DORA\u2019s innovation is the mandated Threat-Lead Penetration Testing (TLPT), to take place at least every 3 years and could involve several financial entities.&nbsp; These tests will focus on critical functions, be performed in live production environments and must be run by external teams.<\/p>\n\n\n\n<p class=\"\"><strong>What next?<\/strong><\/p>\n\n\n\n<p class=\"\">On the 1<sup>st<\/sup> October 2024, Marc Andries started as Director for DORA oversight for critical third party suppliers, appointed by the joint European Supervisory Authorities (ESA).&nbsp; Marc continues to work for the Banque de France and the European Central Bank.&nbsp; Regulatory technical standards will follow which will help financial organisations when selecting critical ICT 3<sup>rd<\/sup> party vendors.<\/p>\n\n\n\n<p class=\"\">In my next post, I will look at overlap and synergies with other EU regulations and directives.<\/p>\n\n\n\n<p class=\"\"><strong>#DORA<\/strong> <strong>#regulation<\/strong> <strong>#EU<\/strong> <strong>#cyber<\/strong> <strong>#cybersecurity<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/blog-image.jpeg?resize=1024%2C1024&#038;ssl=1\" alt=\"\" class=\"wp-image-148\" srcset=\"https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/blog-image.jpeg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/blog-image.jpeg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/blog-image.jpeg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/blog-image.jpeg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/11\/blog-image.jpeg?resize=12%2C12&amp;ssl=1 12w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>","protected":false},"excerpt":{"rendered":"<p>#1 Another European cyber regulation \u2026 not quite. The Digital Operational Resilience Act (DORA) comes into force in January 2025 for financial entities operating in Europe, and their ICT suppliers.&nbsp; Whilst most are expecting a soft launch, being resilient is not a quick fix. In this first post in my series on the DORA regulation, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31],"tags":[],"class_list":["post-147","post","type-post","status-publish","format-standard","hentry","category-dora-regulation"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/posts\/147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/comments?post=147"}],"version-history":[{"count":2,"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/posts\/147\/revisions"}],"predecessor-version":[{"id":164,"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/posts\/147\/revisions\/164"}],"wp:attachment":[{"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/media?parent=147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/categories?post=147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberriskpartners.net\/es\/wp-json\/wp\/v2\/tags?post=147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}