Dora:
Background and purpose

Unitas have, with their expertise, gone in depth with the regulation and 'translated' the law into real implementation, so that you get through the process quickly and efficiently

DORA: Background and purpose

Increased digitization and interconnectedness amplifies the ICT risk. Society as a whole and the financial system in particular therefore become more vulnerable to cyber threats and ICT disruptions. DORA must thus ensure that more is done with the digital resilience of financial entities. At the same time, the digital resilience must be integrated into the units' wider operational framework.

Ultimately, DORA is about trust. The existing high level of interconnectedness among financial entities, financial markets and financial market infrastructures, and in particular the interconnectedness of their ICT systems, can constitute a systemic vulnerability. Local cyber incidents can quickly spread from one of the approximately 22 financial entities in the Union to the entire financial system, unhindered by geographical borders. Serious ICT breaches in the financial sector do not only have an impact on financial entities in isolation. They also pave the way for the propagation of local vulnerabilities across financial transmission channels, triggering potentially negative consequences for the stability of the EU financial system, such as the creation of liquidity outflows and a general loss of trust and confidence in financial markets.

By consolidating and upgrading the different rules on ICT risks, all provisions on digital risk in the financial sector are brought together in a consistent manner for the first time in a single legislative act. With DORA, financial entities must follow the same approach and the same principle-based rules when dealing with ICT risks, taking into account their size and overall risk profile, as well as the nature, scope and complexity of their services, activities and operations.

You can read the entire regulation as well as the delegated and implementing acts by clicking here .

Checklist

When you have downloaded the checklist, you can see the tasks under DORA in the left column of the checklist. Each article in DORA is thus translated into the concrete tasks that must be solved by your cyber and information security efforts. In the right column, you describe your existing and planned efforts in the area. The result is a long series of ticks that you get to set, but there will probably also be DORA tasks that you cannot solve with either the existing or planned efforts.

In other words, if you use the checklist, you will be able to create a maturity report for the management, so that it becomes visible whether you are on the right track, or whether you need to supplement with new measures to get the final ticks off, depending on your risk appetite.

Get the checklist sent immediately by click below. It will automatically arrive in your inbox clear and free.

Get started with DORA

Management must be able to plan, manage and control the organisation's efforts to comply with DORA. That is why we have turned DORA into a checklist, so that your cyber and information security efforts...

1

... is optimized in relation to keeping the hackers out

2

… keeps costs down

3

... keeps management's personal responsibility at bay.

Take 2 minutes to see and hear Jacob Naur talk briefly about DORA and the checklist in the video below.

We throw ourselves around with knowledge...

Order your free material here and receive it in a few minutes in your inbox. To be safe, check your SPAM folder if necessary.

Get material ordered on the website sent

Contact Unitas – your partner in security and compliance

Unitas provides reliable advice in compliance, IT and information security. With a pragmatic approach, we help companies in regulated industries manage security and operational responsibility effectively. Contact us to discuss how we can help you.

Form for contact page

NIS 2 implementation calculates

Wanna join? Sign up Unitas' newsletter

Registration form for newsletter

UNITAS vulnerability scanning