What you should know about the Digital Operational Resilience Act (DORA)

What you should know about the Digital Operational Resilience Act (DORA)

What is digital resilience?

Before discussing DORA, the Digital Operational Resilience Act, we should first understand digital resilience. So, what is digital resilience, and why is digital resilience important? Digital resilience refers to an organization’s ability to maintain, adapt, and recover its operations in the face of digital threats, disruptions, or failures. It encompasses a broad spectrum of activities, including cybersecurity measures, data protection, system redundancies, and response planning. The goal is to ensure that an organization’s digital assets and operations remain secure, reliable, and robust against various forms of digital risks.

What is Digital Operational Resilience Act

The Digital Operational Resilience Act DORA is a regulatory framework proposed by the European Commission, specifically designed to strengthen the digital operational resilience of the financial sector within the European Union. Its primary objectives include:

  • Enhancing Operational Resilience: DORA focuses on strengthening the financial sector’s capacity to withstand, respond to, and recover from ICT-related disruptions. This is increasingly vital due to the growing reliance on digital technologies and the escalating sophistication of cyber threats.
  • Broad Applicability: The operational resilience regulations apply to a diverse range of entities within the financial sector, including traditional institutions like banks and insurance companies, as well as digital finance entities such as FinTech firms and crypto-asset service providers.
  • Risk Management and Incident Response: DORA mandates robust risk management measures, including developing comprehensive cybersecurity policies, strong authentication mechanisms, and effective incident management processes.
  • Collaborative Compliance: The regulation requires financial entities to work closely with supervisory authorities, ensuring a coordinated approach to digital operational resilience.

In essence, DORA establishes a comprehensive framework to safeguard the EU’s financial sector from emerging cyber threats, emphasizing robust risk management and proactive incident response.

Who is Affected by DORA?

DORA’s reach extends across various sectors within the financial industry. Here are the entities under the Digital Operational Resilience Act:

  • Traditional Financial Sector Institutions: Banks, credit institutions, investment firms, and insurance companies are the primary targets of DORA, given their critical role in the financial system and exposure to ICT risks.
  • Digital Finance Entities: This includes innovative sectors like FinTech companies, electronic money institutions, and crypto-asset service providers, reflecting the growing significance of digital finance.
  • Technology and ICT Service Providers: DORA also encompasses providers offering essential services like cloud computing and data analytics, acknowledging their integral role in the digital operations of the financial sector.
  • Supervisory Authority Oversight: Each EU member state’s financial supervisory authorities, such as the Polish Financial Supervision Authority, are responsible for overseeing DORA’s implementation.

This broad scope ensures that DORA effectively enhances operational resilience across the entire financial ecosystem.

What is DORA, the Digital Operational Resilience Act, and What are its Objectives

What are the Key Requirements of DORA?

Core Requirements for Compliance:

DORA establishes several critical requirements for financial institutions and their ICT service providers:

  • Cybersecurity Policy Development: Institutions must create comprehensive cybersecurity policies, including detailed risk assessments and action plans for risk minimization.
  • Security Measure Implementation: This involves adopting a range of security tools and practices, such as encryption and access control, to protect against cyber threats.
  • Incident Detection and Management: DORA requires the establishment of processes for timely detection and effective management of ICT-related incidents.
  • Operational Resilience Testing: Regular testing is mandated to assess the resilience of cybersecurity measures and the organization’s response capabilities.
  • Third-Party Risk Management: Financial entities must ensure that their digital service providers, including cloud services, comply with DORA’s standards.

These requirements form a comprehensive framework to bolster the cybersecurity posture of the EU’s financial sector.

How does DORA Align with Other EU Regulations?

DORA’s Synergy with EU Regulatory Framework:

DORA complements and aligns with several key EU regulations:

  • GDPR (General Data Protection Regulation): Both DORA and GDPR emphasize data protection, with DORA extending this focus to the operational resilience aspect of data security.
  • NIS Directive (Network and Information Systems Directive): While the NIS Directive covers a broader range of sectors, DORA specifically targets the financial sector, enhancing its operational resilience.
  • MiFID II (Markets in Financial Instruments Directive II): DORA supports MiFID II’s financial market transparency and integrity objectives by ensuring financial entities’ operational resilience.
  • PSD2 (Payment Services Directive 2): DORA’s emphasis on strong authentication mechanisms aligns with PSD2’s focus on secure electronic payments.

This alignment with existing regulations ensures a cohesive approach to managing cyber risks and protecting the EU’s financial ecosystem.

What are the Penalties for Non-Compliance with DORA?

Understanding the Consequences of Non-Compliance:

Non-adherence to the Digital Operational Resilience Act (DORA) can lead to significant penalties, emphasizing the importance of compliance:

  • Administrative Sanctions: Regulatory bodies may impose proportionate, effective, and dissuasive sanctions that reflect the severity and intent of non-compliance.
  • Nature of Penalties: Penalties may include cessation of non-compliant practices, monetary measures to ensure ongoing compliance, and public announcements detailing the nature of the infringement.
  • Operational Impact: Severe cases of non-compliance could result in substantial operational restrictions, potentially leading to the cessation of a company’s operations.
  • Proportionality and Dissuasiveness: The structure of these penalties aims to serve as a real deterrent against neglecting cybersecurity obligations, ensuring the stability and integrity of the financial sector.

The penalties underscore the critical need for financial entities and ICT service providers to strictly comply with DORA’s requirements.

dora digital operational resilience act pdf
Download DORA Digital Operational Resilience Act pdf

How Should Organizations Prepare for DORA?

Strategies for Effective DORA Compliance:

Organizations can take several steps to prepare for DORA, ensuring compliance and enhancing their cybersecurity posture:

  • Develop and Update Cybersecurity Policies: Align existing policies with DORA’s requirements, including conducting comprehensive risk assessments.
  • Implement Robust Security Measures: Adopt security measures like encryption and access control that align with DORA’s emphasis on operational resilience.
  • Establish Incident Detection and Management Processes: Create effective strategies for detecting and managing ICT-related incidents.
  • Conduct Digital Operational Resilience Testing: Regularly test cybersecurity measures to assess and improve the organization’s response capabilities.
  • Manage ICT Third-Party Risk: Ensure compliance among digital service providers, a crucial aspect given their impact on the organization’s operations.
  • Implement Strong Authentication Mechanisms: Align with DORA’s requirements for secure access to systems and data protection.
  • Train and Educate Staff: Regular training sessions are essential to raise awareness about cybersecurity risks and DORA’s specific requirements.
  • Cooperate with Supervisory Authorities: Establish a framework for effective cooperation and compliance reporting with relevant authorities.
  • Allocate Appropriate Resources: Dedicate sufficient budget and personnel to meet the cybersecurity and operational resilience needs mandated by DORA.
  • Stay Informed and Agile: Keep up-to-date with any updates or changes to DORA regulations and be prepared to adapt strategies accordingly.

By following these steps, organizations can not only comply with DORA but also strengthen their overall cybersecurity framework.

What is the Timeline for DORA Implementation?

Key Dates and Milestones for DORA Compliance:

The timeline for the implementation of DORA is crucial for organizations to understand and plan accordingly:

  • Entry into Force: DORA was officially enacted on January 16, 2023, marking its establishment as a legal act within the EU.
  • Application Period: The regulation is set to apply from January 17, 2025, providing a transition period for entities to prepare and comply with DORA’s requirements.
  • Effective Preparation: This period is vital for financial institutions, digital finance entities, and ICT service providers to assess their current practices, make necessary adjustments, and implement required measures for full compliance.
  • Training and Awareness: The transition period also offers an opportunity for comprehensive training and awareness programs about DORA’s requirements and the importance of cybersecurity resilience.

Understanding this timeline is essential for entities to effectively prepare for and comply with DORA, ensuring they meet all regulatory requirements within the stipulated timeframe.

How Will DORA Impact Third-Party Service Providers?

Navigating DORA’s Implications for External Vendors:

The Digital Operational Resilience Act (DORA) significantly influences third-party service providers in the following ways:

  • Increased Oversight: Third-party providers offering ICT services to financial institutions will face heightened scrutiny and regulatory oversight under DORA.
  • Compliance Mandates: These providers must ensure their services comply with DORA’s standards, as financial entities are accountable for their third-party vendors’ adherence to the regulation.
  • Prohibitions on Non-Compliance: Financial entities are barred from collaborating with third-party suppliers that fail to meet DORA’s requirements, necessitating strict compliance from these providers.
  • Enhanced Security Measures: Expectations for stronger security protocols, including robust authentication and incident response strategies, will rise for third-party vendors.
  • Contractual Adjustments: Existing agreements between financial entities and ICT service providers may need revisions to include DORA compliance clauses.
  • Verification Responsibilities: Financial organizations will ensure their third-party service providers’ compliance, potentially involving audits and certifications.
  • Market Opportunities: Proactive alignment with DORA may open new business avenues for third-party providers as financial entities seek compliant and secure ICT services.

DORA’s impact extends beyond direct financial entities, encompassing the broader network of service providers integral to the financial sector’s digital operations.

What are the Challenges in Implementing DORA?

Addressing the Complexities of Compliance:

Implementing the Digital Operational Resilience Act (DORA) presents several challenges:

  • Regulatory Interpretation: Understanding the breadth and technicalities of DORA is a significant hurdle, requiring in-depth comprehension and correct application of the regulation.
  • System Integration: Integrating DORA’s requirements into existing IT infrastructures without disrupting operations poses a complex challenge.
  • Financial Implications: The cost of compliance, particularly for smaller entities, includes upgrading systems and ongoing monitoring expenses.
  • Third-Party Risk Management: Ensuring compliance among ICT service providers involves rigorous assessment and potential contract renegotiations.
  • Staff Training: Adequately educating staff about DORA’s requirements and new security protocols is essential but resource-intensive.
  • Regular Testing and Reporting: Establishing robust processes for resilience testing and incident reporting demands significant resources.
  • Adapting to Cyber Threats: Continuously evolving cyber threats require dynamic adaptation of security measures.
  • Balancing Business and Compliance: Aligning DORA’s stringent requirements with business goals without compromising service quality is challenging.
  • Data Privacy Concerns: Reconciling DORA’s mandates with other data protection regulations like GDPR adds complexity.
  • Cross-Border Compliance: Multinational organizations face additional challenges in ensuring consistent compliance across different jurisdictions.

Organizations must strategically navigate these challenges, dedicating appropriate resources and maintaining vigilance to effectively meet DORA’s requirements.

How Does DORA Address Emerging Technologies and Threats?

Future-Proofing Financial Cybersecurity:

DORA’s approach to emerging technologies and cyber threats includes:

  • Adaptive Framework: DORA’s flexible structure allows financial entities to tailor cybersecurity measures to their operational scale, accommodating new technologies and threats.
  • Strong Authentication Focus: The emphasis on robust authentication mechanisms is crucial in countering evolving identity and access management threats.
  • Continuous Testing and Updating: Regular resilience testing ensures financial entities stay ahead of new threats and technological advancements.
  • Incident Reporting for Collective Defense: Mandated incident reporting aids in quickly identifying and responding to new cyber threats, fostering sector-wide information sharing.
  • Risk Management for Integrated Technologies: DORA’s scope includes third-party ICT providers, addressing risks from emerging technologies like cloud services and AI.
  • Encouraging Technological Advancements: While not prescribing specific technologies, DORA promotes the adoption of advanced cybersecurity solutions, including AI and machine learning.
  • Proactive Risk Management: Comprehensive risk assessments and management strategies under DORA anticipate and prepare for emerging threats.

In essence, DORA provides a robust and adaptable framework for the financial sector to effectively respond to the evolving landscape of cyber threats and technological advancements.

Download Our Special Report on DORA and NIS2

Stay Ahead in the Evolving Landscape of Enterprise Cybersecurity:

As the digital world continues to evolve, so do the challenges and regulations surrounding cybersecurity. Understanding the implications of the new Digital Operational Resilience Act (DORA) and The NIS2 (Network and Information Security) Directive is crucial for businesses operating in Europe. We have meticulously analyzed these key documents and their practical impact on businesses like yours to guide you through this complex landscape.

What’s Inside the Report?

Our special report, “Analysis of DORA and NIS2 Regulations in the Context of Enterprise Cyber Security in the EU,” explores these critical regulations in-depth. By downloading this report, you will gain insights into:

  • Innovative Approaches: Discover how DORA and NIS2 are shaping the future of digital resilience in the European business landscape.
  • Comparative Analysis: Understand the differences between DORA and NIS2 and how they uniquely impact your business operations.
  • Compliance and Penalties: Learn about the consequences of non-compliance and the importance of adhering to these regulations.
  • Organizational Responsibility: Find out who in your organization should be responsible for ensuring compliance with DORA and NIS2.
  • Preparation for Changes: Grasp why it’s essential to prepare now for the changes brought about by these regulations.

Why Download This Report?

Our report is not just an analysis; it’s a roadmap to navigating the changes in cybersecurity regulations effectively. It’s written in an accessible way, making it easy to understand and implement the strategies within your organization. Stay informed and be prepared to adapt to the changing security approach of European companies and institutions.

Take the First Step Towards Mastering DORA and NIS2 Compliance: Download the Report and stay one step ahead of the competition. Equip yourself with the knowledge and tools to confidently navigate the future of enterprise cybersecurity in the EU.

Antoni takes care of all the marketing content that comes from Secfense. Read More


We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk



We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director


Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera


Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures

Two-factor authentication is known to be one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve that problem. With their security broker, we were able to introduce various 2FA methods on our web applications at once.

Dariusz Pitala

Head of IT