Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Business Continuity Management
Published November 28 ,2023
Organizations have more dependencies than ever before, particularly in the financial services space. As a result, the risk financial entities face of disruption has only intensified, given the widespread adoption of digital solutions and the increasing use of outsourced service providers.
Add to the mix, organizations, since the pandemic, are functioning in a completely different operational environment. They are likely to have fundamentally changed the way they interact with technology, customers, and their own employees.
Indeed, this need to adapt to (and accelerate) the pace of change increases the risk of digital disruption. However, the same need to quickly adapt to digitization all the while maintaining continuous business operations and safeguarding people, assets, and brand equity makes digital operational resilience management more important than ever before.
As a result, regulators and policymakers have intervened. A few years ago, the Bank of England (BoE) stood out as one of the only major regulators to mandate operational resilience standards in the U.K.’s financial services sector.
The regulatory path paved by the BoE has subsequently been taken up by other national and supranational regulators, including the Australian Prudential Regulation Authority (APRA) and the U.S. Federal Reserve.
Here, in the EU, we have the Digital Operational Resilience Act (DORA), the first such Bloc-wide policy seeking to align the approach to managing information and communications technologies (ICT) and cyber risk in the financial sector across all EU member states.
What’s DORA all about? This guide serves as a primer to the Digital Operational Resilience Act (DORA), focusing on what’s in the regulation and what affected entities should expect.
A binding EU regulation on digital operational resilience for the financial sector, DORA seeks to address potential systemic and concentration risks posed by the financial sector’s reliance on ICT third-party providers (TPPs). How?
Well, DORA introduces an oversight framework for EU TPPs deemed to be “critical to the stability and integrity of the [EU] financial system”i. DORA also seeks to consolidate and upgrade ICT risk requirements throughout the financial sector, to ensure that all participants of the financial system are subject to a common set of standards to mitigate ICT risks for their operations.
What, then, is the thinking behind DORA? As regulators aver, financial institutions, before DORA, have been managing the main categories of operational risk mainly with the allocation of capital, without much thought paid to all aspects of operational resilience. But ICT incidents and a lack of operational resilience can jeopardise the soundness of the entire financial system, even with adequate capital for the traditional risk categories.
As with similar regulations, the intention behind DORA is to ensure that all participants in the financial system have the necessary safeguards to mitigate cyber-attacks and other risks. And so, the Regulation, once it comes into force fully in 17 January 2025, will require firms to ensure that they can withstand all types of ICT-related disruptions and threats.
Who’s covered by DORA?
DORA covers a broad range of financial institutions, including the following:
DORA itself provides provisions for ICT risk and incident management, setting rules for ICT risk-management, incident reporting, operational resilience testing, and ICT third-party risk monitoring, all of which this guide will tackle.
The main tenets of the Regulation, as laid out in its first Article, read as follows:
Digital operational resilience is at the centre of DORA. But what does it mean? The definition, as provided in the Regulation, is long:
Digital operational resilience refers to the ability of a financial entity to build, assure, and review its operational integrity and reliability by ensuring, either directly or indirectly through the use of services provided by ICT third-party service providers, the full range of ICT-related capabilities needed to address the security of the network and information systems which a financial entity uses, and which support the continued provision of financial services and their quality, including throughout disruptions.
To ensure digital operational resilience, entities must mitigate ICT risk. What is ICT risk, though?
Again, the Regulation defines ICT risk as a reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment.
How, then, does DORA go about addressing ICT risk? The Regulation does so by mandating financial entities to put in place an internal governance and control framework to ensure the effective and prudent management of ICT risk, to achieve a high level of digital operational resilience.
Who’s responsible for taking these actions? Per the Regulation, the management body of the financial entity must define, approve, oversee, and be responsible for the implementation of all arrangements related to the ICT risk management framework.
Specific requirements for that management body include the following:
What other requirements do financial entities have? According to DORA, financial entities must also establish a role to monitor the arrangements concluded with ICT third-party service providers on the use of ICT services or designate a member of senior management as responsible for overseeing the related risk exposure and relevant documentation.
A further requirement of the management body is to actively keep up to date with sufficient knowledge and skills to understand and assess ICT risk and its impact on the operations of the financial entity, including by following specific training on a regular basis – with that training being commensurate to the ICT risk being managed.
What if an ICT incident should occur anyway? As such events (single or linked) can have an adverse impact on the availability, authenticity, integrity, or confidentiality of data, or on the services provided by the financial entity, they are to be handled with great care.
DORA lays out concrete incident reporting requirements for entities who are thus affected. And those requirements include:
The above requirements bespeak the need for entities to establish ICT-related incident management processes. Of that process, the Regulation mandates entities do the following:
Of course, these processes must all be tested to ensure they will hold up during an ICT-related incident. To that end, the Regulation lays out a host of testing requirements intended to ensure digital operational resilience.
The requirements include:
As noted, the rationale for DORA comes from the clear emergence of ICT third-party risk as a key threat vector and challenge to digital operational resilience. But what is ICT third-party risk, exactly?
The Regulation defines ICT third-party risk as ICT risk that may arise due to ICT services provided by ICT third-party service providers or their subcontractors.
How, then, does DORA propose to regulate ICT-third party risk. The Regulation does so through the imposition of the following ICT third-party risk management requirements:
Given the extensive nature of DORA, regulated entities will have their hands full to ensure compliance when the Regulation comes into full force in January 2025. Nevertheless, they should consider this compliance process as an opportunity to up their digital operational resilience baseline, given the number of threats they face.
So, what actions should be taken? We recommend the following:
Finally, DORA is here; and compliance will be needed in no time. As this guide has laid out, compliance will be complex, as the Regulation is expansive. Key to compliance, though, will be finding the appropriate systems, protocols, and tools for ICT risk and incident management.
Reliable platforms like Noggin can help. They come equipped with sufficient capacity to accurately process necessary data and will remain technologically resilient, to adequately deal with additional information processing needs as required under adverse situations.
i. Sebastian Bruchwitz et al, JD Supra: Too Important To Fail? Further Light on When EU and Non-EU Technology Providers Will Become Subject To DORA. Available at https://www.jdsupra.com/legalnews/too-important-to-fail-further-light on-9895139/.
ii. Hugo Atzema and Noah Brandwijk, Deloitte: What can we expect from the Digital Operational Resilience Act? Available at https://www2.deloitte.com/nl/nl/pages/risk/articles/digital-operational-resilience-act.html