Commentary on the Digital Operational Resilience Act (DORA)

B2B Cyber ​​Security ShortNews
Advertising

Share post

Unlike other sectors of the economy that also have to comply with NIS2, the financial sector is no stranger to strict regulations like DORA. These organizations have worked hard on their data resilience and cybersecurity strategies.

Even if they have to comply with an additional regulation with DORA, the gap between the current and required state of affairs should be manageable, at least as far as their internal processes are concerned. It's a completely different story when it comes to third-party offerings and services and the entire supply chain. No matter how exemplary a compliance record you have, companies that cannot guarantee that relevant partners also comply with the regulations will have difficulty demonstrating holistic compliance, which could lead to potential fines or other negative consequences.

Advertising

Compliance with DORA as an essential requirement

At a minimum, companies must ensure that robust risk management processes are implemented across the entire supply chain. In this context, companies must require the renegotiation of all third-party service level agreements (SLAs) to solidify compliance with DORA as a key prerequisite for collaboration. While it is time-consuming, companies should not underestimate the importance of ensuring that third parties also comply with applicable regulations. (Andre Troskie, EMEA Field CISO, Veeam)

More at Veeam.com

 


About Veeam

Veeam offers companies resiliency through data security, data recovery and data freedom for their hybrid cloud. Veeam Data Platform offers a single solution for cloud, virtual, physical, SaaS and Kubernetes environments, giving businesses the confidence that their applications and data are protected and always available to keep their businesses running.


 

Matching articles on the topic

Criminals use RMM tools to inject malware

Cybercriminals are increasingly abusing remote monitoring and management (RMM) tools, which are actually used for remote maintenance. In this way, they penetrate ➡ Read more

Email: Security threatened by AI-based attacks

AI-based phishing emails and deepfakes endanger the security of email communication. Therefore, email protection should be a top priority. To ward off attacks, ➡ Read more

Ransomware attacks hypervisors

A new ransomware attack by the well-known cybercriminal group RedCurl specifically targets hypervisors rather than endpoints. The attackers aim to ➡ Read more

SideWinder: The APT group attacks nuclear power plants

The APT group SideWinder, which has been active for more than a decade, has expanded its attacks to new targets and regions ➡ Read more

Securing the software supply chain for the Cyber ​​Resilience Act

In recent years, IT security managers and their teams have increasingly had to deal with cyber risks associated with their vendors’ software supply chains ➡ Read more

Ransomware attacks are increasing sharply

After a period of calm, security experts are now reporting a sharp increase in ransomware attacks. Compared to February ➡ Read more

140 percent plus: Remote ransomware is increasing rapidly 

Latest findings from the field of remote ransomware: The research of the security specialists has already shown the enormous increase in remote encryption attacks by the end of 2023. ➡ Read more

Fines for violations of the GDPR

US companies and institutions are the most frequently targeted victims of cybersecurity attacks worldwide, followed by Germany and the UK. ➡ Read more