_($0PXQFQ7Y(P~4838LJ_]L.png

管理培训搜索
18318889481

产服
| 产业中心

体育产业 新能源产业 预制菜产业 轻纺工业 安全与应急产业 高端装备制造业

| 企业与产业管理

建筑工程管理 安全企业管理 制造企业管理 卫生企业管理 企业转型升级 工程企业管理 企业质量管理 医药企业管理 企业经济管理 食品企业管理 工业企业管理 软件企业管理 能源企业管理 汽车企业管理 环保企业管理

| 行业中心

新鲜牛肉市场 酒店业 旅游休闲与饭店业 服装服饰

| 转创产研

教育产业 中医药产业

| 转创科研

食物与营养研究所 标准化科学

| 乡村振兴战略

乡村振兴 乡村振兴 乡村振兴工委会 乡村振兴规划设计 乡村人才振兴 乡村产业振兴

| 创新创业中心

创新创业创投创意 BIM工程 制造业创新 《类似商品和服务区别分表》 创新创业与可持续 智能制造 民营企业与经济 科技企业管理 智能企业管理

| 转型升级中心

消防企业管理 转型升级 装配式建筑 并购重组动态 制造业转型升级 工业转型升级 教育转型升级 外贸转型升级 能源转型升级 地产转型升级 制造业转型与高质量发展 产业转型升级 绿色转型升级 服务业转型升级 产品质量管理 产业科技管理 环境监测

| 数据经济与网安

信息与软件 系统集成 人工智能 互联网+ 网络工程 数字经济 数字安全 视觉传达设计 工业互联网 数字媒体艺术 数字创新中心 电子信息产业 工业物联网 数字转型 视觉传播设计与制作 信创产业 网络安全产业 无人机 新一代信息技术产业

| 绿创中心

绿色建筑 节能减排

| 双碳与可持续发展

可持续发展 绿色转型与可持续发展

| PREPARING FOR THE NEW DIGITAL OPERATIONAL RESILIENCE RULES当前您所在的位置:首页 > 产服 > 数据经济与网安 > 数字经济

Preparing for the New Digital Operational Resilience Rules

EXECUTIVE SUMMARY

Rapid digitization of the European financial services sector in the last two decades has 
put technology at the center of all financial activities, exposing institutions to a broad 
set of new and emerging risks. In response, institutions have built out controls aimed at 
mitigating these risks and have developed back-up protocols to “keep the lights on” in the 
event that critical digital infrastructure fails.

But maintaining robust defenses against information and communications technology (ICT) 
risks has not come naturally to many financial institutions. Efforts to establish operational 
resilience often have been haphazard and poorly coordinated, resulting in deficient control 
environments or poor backup plans for critical activities. Making matters worse, board 
members and senior managers are often unaware that the institution is running unacceptably 
high levels of ICT risk because management information is poor or non-existent. A series of 
high-profile outages and business disruptions at European banks over the last few years has 
underscored the threat that the lack of operational resilience poses for the industry.

In response, the European Council has turned its attention to instilling more robust 
operational resilience across the financial services sector, while consolidating and 
harmonizing existing national regulation.

The Digital Operational Resilience Act (DORA) sets out a detailed and comprehensive 
framework for the management of ICT risks for European financial institutions.

DORA consists of five pillars that lay out requirements and expectations for different 
aspects of operational resilience: ICT risk management and governance, ICT-related incident 
reporting, digital operational resilience testing, ICT third-party risk, and information sharing.

While DORA is still an evolving standard, the direction of travel from the regulator is clear 
and requires a fundamental mindset shift across institutions.

Complying with DORA will not be easy — it requires a 

purposeful and deliberate business-led technology strategy, 

and an integrated risk management approach aligned to critical 

business services.

The size of the prize from better operational resilience is potentially enormous: reduced 
financial losses from operational incidents, faster and more trouble-free implementation of 
new systems, maintenance of good customer service levels, increased brand value, lower risk 
management costs, as well as lower regulatory risk. Building digital operational resilience 
is not optional and no longer a topic that is confined to specialists in IT and risk; it needs 
widespread engagement from across the organization, including from individual business 
lines, senior management, and boards.

© Oliver Wyman

3

Preparing for the New Digital Operational Resilience Rules

THE CASE FOR OPERATIONAL RESILIENCE

In the last two decades financial institutions have grown rapidly, driven by large 
investments in technology and increasing digitization of processes. With more than 80% 
of payments in the European Union being processed electronically, according to a study 
by industry group Payments Europe, and the volume of data stored in the cloud by banks 
expected to double over the next three years according to another recent study, the 
industry is seeing the level of digitization reach new peaks. Financial institutions have 
become increasingly exposed to a wide spectrum of digital-related risks  — everything 
from fraud and malicious attacks to technical outages and data losses. In response to 
these emerging risks, financial institutions have been on a journey to build controls that 
establish operational resilience — the ability to prevent, respond, recover, and learn from 
operational disruption.

Efforts to build operational resilience have been fragmented and inconsistent within 
financial institutions. Typically, IT teams have looked after operational resilience in a silo, 
putting in place controls and backup plans for new digital assets in order to maintain 
operational continuity. Security teams under the chief information security officer may 
put in place further controls aimed at managing cyber risk. Risk teams have focused on 
ensuring there are appropriate second-line controls and oversight, yet often at a less 
operational level. Business leaders often neglect giving adequate focus to the control 
environment, assuming the responsibility of implementing and operating controls sits 
with the IT, security, and risk teams. Meanwhile compliance is predominantly focused on 
force-fitting these activities and controls to align with what the regulator has demanded.

With so much activity taking place in silos, there has been a 

fundamental lack of a joined-up, integrated approach.

Recent well-publicized incidents in Europe, such as failed bank IT migrations that led 
to millions of customers being unable to access online services and trading stops 
after serious technical failures impacted exchanges’ data management systems, have 
demonstrated that the threat of operational incidents is real. With operational disruptions 
and a rapidly evolving threat landscape becoming increasingly prevalent, the European 
Council’s focus has turned to getting a tighter grip on operational resilience across the 
financial services sector.

© Oliver Wyman

4

Preparing for the New Digital Operational Resilience Rules

INTRODUCING ‘DORA’

Against this backdrop, the European Council has set an intention to bring stricter guidance 
and oversight on how ICT risks are managed, acknowledging that there is a proliferation of 
both national and international regulatory initiatives and supervisory approaches. Given 
the ever-increasing risks of cyberattacks and the importance of a resilient financial sector, 
the Commission aims to develop an approach that fosters technological development and 
ensures financial stability and consumer protection.

To this effect, it has set out to define a detailed and comprehensive framework on 
management of ICT risks for EU financial entities, the Digital Operational Resilience Act 
(DORA), which was adopted by the European Council in November 2022 and is now being 
transposed into law by each EU member state, with an expected two-year implementation 
period. The regulation applies to a wide array of financial entities, from traditional financial 
services players such as credit institutions, payment institutions, investment firms, and 
exchanges, to more recent entrants to the sector such as crypto-asset services, fintechs, 
and ICT third-party providers.

DORA goes beyond existing regulations by bringing together multiple aspects of operational 
resilience into one framework, while also increasing the level of expectations on how 
institutions go about managing ICT risks. It sets out a broad set of requirements across five 
foundational pillars shown in Exhibit 1.

Exhibit 1: Five pillars of DORA

ICT risk management

and governance

1

2

3

4

5

Incident

reporting

Digital operational

resilience testing

ICT

third-party risk

Information

sharing

The approach centers on identifying critical business services and building the resilience 
framework around them. This reflects a mindset shift by the European regulator and an 
evolution to approaches observed at the Federal Reserve and Bank of England, in which the 
strategy for building resilience is more outcomes-based.

© Oliver Wyman

5

Preparing for the New Digital Operational Resilience Rules

The level of detail in the regulation varies across different pillars. Some elements of the 
regulation are highly prescriptive, for example listing exact elements the regulator thinks 
should be included in an ICT third-party provider contract. Other parts are comparatively 
high level, such as the guidance on what should be included in the governance and 
control framework.

We expect DORA to be an evolving standard that will change as operational resilience 
practices develop and standards are iterated between regulators and industry. What is clear, 
however, is that operational resilience is increasingly looking to become a prime focus of 
regulators this decade.

THE CHALLENGE OF DORA COMPLIANCE

Complying with DORA won’t be easy. For many organizations the regulation fundamentally 
changes how operational resilience is currently thought about, requiring institutions to 
deconstruct and assess the complexity of their own IT systems and processes and answer 
some tough questions on their management of ICT risk for critical business services.

Based on the emerging guidance across the five pillars, there are a number of key 
requirements we observe that introduce challenges for institutions in building resilience, 
while also posing a number of questions on the practicalities of implementation for 
institutions (see table on following page).

Fundamentally, instilling operational resilience throughout the 

organization requires a deliberate approach driven top-down by 

senior management and the board, who will need to be involved in 

defining the operational resilience strategy and how it links to the 

business strategy.

Financial entities should already start undertaking measures to prepare for DORA. The 
length of time required to enact the required standards across the entire organization, 
including all underlying entities, should not be underestimated due to the need to engage 
a diverse set of stakeholders, secure sufficient investment to implement the necessary 
capabilities, and balance the implementation alongside what is an already busy portfolio of 
technology work.

© Oliver Wyman

6

Preparing for the New Digital Operational Resilience Rules

Exhibit 2: Challenges and questions raised by DORA

Summary requirements

Challenges observed

Key questions for 

Financial Institutions

1

ICT risk

management

and

governance

The management body 

of a financial entity is 

required to define, approve, 

oversee, and be accountable 

for the implementation 

of all arrangements 

related to the ICT risk 

management framework

•  Senior management and 

board-level accountability is 

expected, which should link 

the business strategy to the 

resilience strategy

•  An integrated risk management 

approach is required that 

designates and agrees across 

the enterprise what the critical 

business services are and 

which assets are instrumental 

in driving those

•  What is the exact role of 

senior management and the 

board in steering the digital 

resilience strategy?

•  How to achieve business 

benefits from end-to-end 

management of critical 

business services?

•  What are the organizational 

implications of this framework?

•  Where do we start?

2

ICT-related

incident

reporting

Financial entities are required 

to establish and implement 

an ICT-related incident 

management process to 

detect, manage, and notify 

ICT-related incidents and shall 

put in place early warning 

indicators as alerts

•  Integration of predictive 

analytics into incident 

management through early 

warning indicators is necessary 

to drive proactivity in 

the organization

•  A classification framework for 

incident handling should guide 

proportionality and consistency 

in the response

•  What set of early warning 

indicators should be monitored?

•  How can incident 

management and reporting 

be made consistent 

despite differing national 

reporting requirements?

•  How should severity thresholds 

be set for classifying ICT-

related incidents?

3

Digital

operational

resilience

testing

Financial entities are required 

to establish and implement 

an ICT-related incident 

management process to 

detect, manage, and notify 

ICT-related incidents and shall 

put in place early warning 

indicators as alerts

•  A comprehensive testing 

program should be in place 

that considers a wide variety 

of tests limited not just to IT 

systems, but also extending to 

processes and people

•  The overarching testing 

regimen should be governed 

through a risk-based 

approach, taking into account 

service criticality

•  How can existing testing 

programs be adapted to meet 

these requirements?

•  Which kinds of tests should 

be used for which systems 

and applications?

•  Which tests can be performed 

internally and which require 

independent external testers?

4

ICT

third-party

risk

Financial entities shall 

manage ICT third-party risk 

as an integral component of 

ICT risk within their ICT risk 

management framework 

and in accordance with key 

principles for ICT third- party 

risk management

issued by the 

regulatory authority

•  A purposeful and deliberate 

business-led strategy for use 

and management of third-party 

providers is required

•  Adequate due diligence of 

third party providers with 

contractual agreements 

that clearly set out rights 

and obligations

•  Is the overarching ICT third-

party risk strategy clearly 

purposeful and deliberate?

•  Is the cost of risk management 

for smaller, less sophisticated 

third-party vendors worth it?

5

Information

sharing

Financial entities may 

exchange among themselves 

cyber threat information 

and intelligence, including 

indicators of compromise, 

tactics, techniques, and 

procedures, cyber security 

alerts, and configuration tools

•  Organizations should be on 

the front foot in exchanging 

cyber threat information and 

intelligence, with it being better 

to have something already 

in place than waiting for the 

regulator to introduce clear 

standards and templates

•  Which entities should be 

in charge of setting up and 

running the information 

exchange alliances?

•  How should sensitive technical 

information be shared to the 

benefit of all?

•  What tooling is required to 

facilitate information sharing?

Note: Detailed requirements for each pillar can be found in the Appendix.

Pillar

© Oliver Wyman

7

Preparing for the New Digital Operational Resilience Rules

BENEFITS OF A MORE RESILIENT INSTITUTION

The long-term competitive benefits of better operational resilience are undeniable — complying 
with the spirit of DORA as opposed to approaching it as a ‘box-ticking exercise’ — will yield 
significant upside. Fundamentally, DORA presents organizations with a pivotal opportunity to 
strategically redesign their framework for management of technology-related risks and build 
end-to-end resilience throughout the enterprise. Improving operational resilience will have 
repercussions broadly, from improving client experience, allowing employees to perform their 
roles more effectively, to reducing the financial losses associated with operational incidents.

Exhibit 3: Benefits of operational resilience

Increased Brand Value

Effecient Implentation

Seamless implementation of 

new systems with an 

integrated risk strategy

Lower Regulatory Risk

Reduced risk of regulatory 

non-compliance with international 

or regional legislation

Reduced Financial Losses

Lower direct costs associated with 

critical incidents such as client 

compensation or regulatory fines

Strengthened brand 

reputation and value 

Lower Risk Managment Costs

Fewer high-risk events and a more 

streamlined risk management 

process result in lower costs

Improved client experience

Streamlined customer experience 

and improved customer service 

levels with less disruption

In light of these benefits, senior management and boards should be driving operational 
resilience as a key agenda item, with active involvement from key stakeholders across the 
organization. Building operational resilience for financial institutions is not optional and no 
longer a topic that is confined to specialists in risk and IT.

© Oliver Wyman  TESG

8

Preparing for the New Digital Operational Resilience Rules

APPENDIX: DORA REQUIREMENTS BY PILLAR

Summary requirements

1 ICT risk

management

and

governance

•  Financial entities shall have in place internal governance and control 

frameworks that ensure an effective and prudent management of all 

ICT risks.

•  Financial entities shall have a sound, comprehensive, and well-documented 

ICT risk management framework, which enables them to address ICT 

risk quickly, efficiently, and comprehensively and to ensure a high level 

of digital operational resilience that matches their business needs, size, 

and complexity.

•  Financial entities shall use and maintain updated ICT systems, protocols, 

and tools.

•  Financial entities shall identify, classify, and adequately document all 

ICT-related business functions, the information assets supporting these 

functions, and the ICT system configurations and interconnections with 

internal and external ICT systems. Financial entities shall review as needed, 

and at least yearly, the adequacy of the classification of the information 

assets and of any relevant documentation.

•  For the purposes of adequately protecting the ICT systems and with a 

view to organizing response measures, financial entities shall continuously 

monitor and control the functioning of the ICT systems and tools and shall 

minimize the impact of such risks through the deployment of appropriate 

ICT security tools, policies, and procedures.

•  Financial entities shall have in place mechanisms to promptly detect 

anomalous activities, including ICT network performance issues and 

ICT-related incidents, and to identify all potential material single points 

of failure.

•  Financial entities shall put in place a dedicated and comprehensive ICT 

business continuity policy as an integral part of the operational business 

continuity policy of the financial entity.

•  For the purpose of ensuring the restoration of ICT systems with minimum 

downtime and limited disruption, as part of their ICT risk management 

framework, financial entities shall develop a backup policy and 

recovery methods.

•  Financial entities shall have in place capabilities and staff, suited to their 

size, business, and risk profiles, to gather information on vulnerabilities and 

cyber threats, ICT-related incidents, in particular cyberattacks, and analyze 

their likely impacts on their digital operational resilience.

2 ICT-related

incident

reporting

•  Financial entities shall establish and implement an ICT-related incident 

management process to detect, manage, and notify ICT-related incidents 

and shall put in place early warning indicators as alerts.

•  Financial entities shall establish appropriate processes to ensure a 

consistent and integrated monitoring, handling, and follow-up of ICT-

related incidents, to make sure that root causes are identified and 

eradicated to prevent the occurrence of such incidents.

•  Financial entities shall classify ICT-related incidents and shall determine 

their impact based on the following criteria:

 

the number of users or financial counterparts affected by 

the disruption.

 

the duration of the ICT-related incident.

 

the geographical spread


转创君
企业概况
联系我们
专家顾问
企业文化
党风建设
财税人才库
团队建设
资质荣誉
领导资源
专家库
公司公告
资源与智库
战略合作伙伴
质量保证
咨询流程
联系我们
咨询
IPO咨询
中国企业国际化发展战略
投融资规划
企业管理咨询
人力资源管理
风险管理
竞争战略
集团管控
并购重组
家族办公室
资产管理
股权设计
企业管治与内部审计
企业估值
价值办公室
内控咨询
投资银行
管治、内控及合规服务
法律咨询
服务
管理咨询服务
投融资规划
人力资源
资产评估服务
会计服务
科技服务
资质认证
ESG服务
商务咨询
内部控制服务
投资咨询
金融服务咨询
企业服务
财会服务
财审
金融会计专题
法证会计
国际财务管理
会计中心
财务咨询
内部审计专题
审计创新
代理记账中心
会计师事务所
审计中心
审计及鉴证
专项审计
审计监察
智能会计工厂
税务
财税中心
转创税务
华税律所
纳税筹划
税收筹划
出口退(免)税
IPO财税
国际税收
涉税服务
国际税务研究所
金融
金融风险管理
纳斯达克
并购交易服务
北交所
IPO咨询
深交所
上交所
直通新三板
董秘工作平台
独立董事事务
SPAC
资本市场服务中心
澳洲上市
加拿大上市
估值分析事务
香港联交所
新交所
金融分析师事务所
投融
广东股权交易中心
股权律师
顶层架构设计
投资者保护
金融监管与风险内控
投融资规划事务所
融资担保
股权中心
合规
合规与政府管制
企业合规
网络安全与隐私保护
法证会计与反舞弊
反洗钱与制裁合规
反垄断中心
企业合规管理咨询
合规中心
转创全球企业合规
合规律师事务所
金融安全与合规
海关及全球贸易合规
ESG合规
反欺诈中心
合规中心(产业)
知识产权合规专题
资产评估合规
私募股权基金合规
转创国际合规研究所
纪检监察研究中心
法信
征信管理
信用中心
法信中心
信用评级
联合资信
国际信用
安企中心
公证服务
转创法信
诚信管理
法信中国
管理
并购重组
转创国际企业研究所
创新创业
转型升级
知识产权
投融资规划
ESG中心
风险与内控
管理咨询
资产评估
人力资源
IPO咨询
高企认定
法律
刑事法律服务
资本市场法律服务
财税金融法律事务
转创国际合规律师
信托与财富管理法律
国际法律中心
民商事法律服务
公司法律服务
公共法律服务中心
转创国际法律事务所
华南
转创私董会
转创网校
转创国际广西
转创法信科技
Family Office
中国转创杂志社
汕头市金融协会
18318889481
在线QQ
在线留言
返回首页
返回顶部
留言板
发送