A new framework for third-party risk in the European Union
Report: DORA and cyber risk
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
At the start of 2023, the Digital Operational Resilience Act (DORA) came into force in the EU to protect customers and EU financial institutions from systemic cybersecurity risks affecting information and communication technology (ICT).
DORA was introduced as a method of building risk resilience within financial organizations, ensuring that they establish and monitor trust networks among their ICT and their vendors.
This paper from SecurityScorecard highlights the security risks - including third-party - impacting financial entities in the EU today and introduces a verification framework for DORA, covering all major aspects of it to support institutions in their preparation.
You will learn:
- How zero trust can provide the framework to mitigate third-party risk
- The seven steps financial institutions need to follow to prepare for DORA
- How SecurityScorecard can empower your business to stay ahead of potential threats and vulnerabilities.
Download today.
Provided by SecurityScorecard
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Salesforce targets telco gains with new agentic AI toolsNews Telecoms operators can draw on an array of pre-built agents to automate and streamline tasks
-
Four national compute resources launched for cutting-edge science and researchNews The new national compute centers will receive a total of £76 million in funding
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Securing the supply chain: Why zero trust and recovery readiness are non-negotiableIndustry Insights To prevent supply chain attacks, suppliers must be embedded in trusted business architecture
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
What security teams need to know about the NSA's new zero trust guidelinesNews The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices
-
Fears over “AI model collapse” are fueling a shift to zero trust data governance strategiesNews Gartner warns of "model collapse" as AI-generated data proliferates – and says organizations need to beware
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
