APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Mobile Application
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Mobile Application
    Editor's Pick (1 - 4 of 8)
    left
    Balancing Safety, Compliance, and Strategic Growth

    Digno Bernardino, Head of Risk Management, Philippines AirAsia

    5 Steps for Securing Your Software Supply Chain

    Edwin Kwan, Head Of Cyber Security Advisory And Application Security, Tyro Payments

    Navigating Challenges and Opportunities

    Guillermo Quesada, Group Operations Manager, Hero Experiences Group

    Your Application is Mostly Written by Strangers

    Edwin Kwan, Head Of Application And Software Security, Tyro Payments

    Open API

    Ariunbold Buyan-Ulzii, Chief Information Officer and Saruulbat Gantugs, Manager at IT Architect, Khan Bank

    Insights from the Travel and Hospitality Domain: A Journey of Innovation and Guest-Centricity

    Achdan Harris, Senior Director, Guest Facing Applications at Langham Hospitality Group

    Technological Trends Driving Operational Efficiency

    Tim Leung, Group Cto, Tricor Group

    Application Modernization and Security in a Hybrid Environment

    Amar Narain, Chief Information Technology and Vice President of Information Technology, Pizza Pizza [Tse: Pza]

    right

    DORA: A New Era for Cyber Security

    Laura Quaroni, Head Of Privacy & Security, Banca Ifis

    Tweet
    content-image

    Laura Quaroni, Head Of Privacy & Security, Banca Ifis

    On 16 January 2023, the DORA Regulation came into force; the Digital Operational Resilience Act (DORA regulation) aims to consolidate and harmonize the main cybersecurity requirements at the European level with reference to digital operational resilience in the financial sector, addressing banks, insurance companies, cryptocurrency service companies, financial institutions and their critical suppliers.

    The regulation affects a wide range of corporate subjects and will be binding starting from 17 January 2025 (24 months after its publication in the Official Journal of the European Union). By that date, banks, insurance companies and cryptocurrency operators will have to adapt their cyber security safeguards.

    The DORA Regulation is in force; it is advisable to plan and start an adaptation process.

    All actors falling within the scope of the DORA Regulation must prepare to implement the regulation, developing or updating their own incident reporting procedures in line with the new regulatory requirements.

    The regulation presents various ‘pillars’ that companies will have to consider, and in particular in the area of governance and internal organization, ICT risk management, incident management, and ICT supplier management.

    Financial entities will have to adopt internal cybersecurity governance and a control system such as to guarantee effective and prudent management of all ICT risks in order to achieve a high level of digital operational resilience.

    They will also need to have a structured, comprehensive and well-documented cyber risk management framework in place.

    Numerous provisions have been introduced regarding the management of incidents related to ICT services. In particular, regarding the reporting of related incidents, financial entities will have to establish and implement a management process to monitor and record ICT related incidents, classify them and report them to the competent authorities.

    In order to mitigate the risks deriving from the dependence of financial entities on third-party service providers, specific supervisory powers are envisaged to be conferred on the financial supervisory authorities.

    Therefore, in addition to providing a Europe-wide surveillance framework for third-party providers of critical ICT services, key contractual aspects will be harmonized to ensure that financial firms monitor third-party cyber risks. Furthermore, to ensure adequate monitoring of technology service providers that perform a critical function for the functioning of the financial sector, a ‘lead’ supervisory authority will be defined for each critical third-party ICT service provider. Therefore, the DORA Regulation is particularly onerous even for the suppliers of critical services to these companies.

    Financial Entities Will Have To Adopt Internal Cybersecurity Governance And A Control System Such To Guarantee Effective And Prudent Management Of All Ict Risks In Order To Achieve A High Level Of Digital Operational Resilience

    It is true that the latest report of the World Economic Forum (Global Security Outlook 2023) warns companies against third-party risk in the geopolitical context since the latest known incidents have heavily involved the supply chain.

    In full awareness of the opportunities that the DORA Regulation offers, Banca IFIS has launched a regulatory impact analysis, envisaging a multidisciplinary team that involves resources from various internal functions, technical and organizational, legal and control functions. This path aims to accelerate the evolution of models and tools in order to ensure compliance with applicable regulations in force (Supervisory Regulations, DORA, etc.), to the definition of a sustainable path towards compliance, based on adaptation logic progressive, to the prioritization of interventions, also on the basis of initiatives in progress in the cyber security field.

    tag

    Financial

    Weekly Brief

    loading
    Top 10 Mobile Application Security Solutions Providers in APAC - 2024
    ON THE DECK

    Mobile Application 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://mobile-application.apacciooutlook.com/views/dora-a-new-era-for-cyber-security-nwid-9756.html