<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Roxane Bohin, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/roxane-bohin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/roxane-bohin/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 13 Apr 2023 15:01:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Roxane Bohin, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/roxane-bohin/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>[INTERVIEW] Operational resilience, how to recover after an attack!</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/04/interview-operational-resilience-how-to-recover-after-an-attack/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/04/interview-operational-resilience-how-to-recover-after-an-attack/#respond</comments>
		
		<dc:creator><![CDATA[Roxane Bohin]]></dc:creator>
		<pubDate>Thu, 13 Apr 2023 15:01:50 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[conformité]]></category>
		<category><![CDATA[DORA]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<category><![CDATA[OpRes]]></category>
		<category><![CDATA[Résilience opérationnelle]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20317</guid>

					<description><![CDATA[<p>Hello Roxane! Thank you for your time! Today, we’re going to talk about the Operational Resilience Maturity Assessment Framework. Could you summarize the tool in one sentence? To sum up, the Operational Resilience Maturity Assessment Framework is a tool that...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/interview-operational-resilience-how-to-recover-after-an-attack/">[INTERVIEW] Operational resilience, how to recover after an attack!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h4 style="text-align: justify;"><span style="color: #800080;">Hello Roxane! Thank you for your time! Today, we’re going to talk about the <em>Operational Resilience Maturity Assessment Framework</em>. Could you summarize the tool in one sentence?</span></h4>
<p style="text-align: justify;">To sum up, the <em>Operational Resilience Maturity Assessment Framework</em> is a tool that measures the level of operational resilience of an organization.</p>
<h4 style="text-align: justify;"><span style="color: #800080;"><strong>What is Operational Resilience?</strong></span></h4>
<p style="text-align: justify;">We believe that Operational Resilience (OpRes) is a young but increasingly unavoidable issue for our clients, especially for those in the financial sector. The United Kingdom has been a pioneer in this field, with an Operational Resilience Framework coming into force in March 2022, imposed by the Bank of England, the Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA). Similarly, the European Union is set to follow suit, with its Digital Operational Resilience Act (DORA). The underlying principle for both legal frameworks is the acknowledgement that many events, both internal and external, can disrupt the activities of banks and other organizations.</p>
<p style="text-align: justify;">Operational resilience therefore involves different sources of threats: from third parties (partners, suppliers, or service providers), pandemics, power failures, fire, to name but a few. From an organisational point of view, resilience is very often a program driven by the Head of Operational Resilience, the IT department or the risk division, and less often by a CISO.</p>
<h4 style="text-align: justify;"><span style="color: #800080;">Why did you create this tool? What problem does it solve for clients?</span></h4>
<p style="text-align: justify;">Under pressure from regulators, our clients have launched programs to increase their level of resilience, and therefore have had to measure their maturity level, both before and after these programs. <strong>Compliance is a good starting point, but it doesn&#8217;t go far enough</strong>! The idea of our Operational Resilience Maturity Assessment Framework is to provide a tool that encompasses both these new guidelines, and the best practices observed in the field. The tool is useful because it:</p>
<ul style="text-align: justify;">
<li>Measures the maturity of an organization, in terms of the methodologies and processes in place to address Operational Resilience.</li>
<li>Reports on the actual resilience capabilities at a given moment by analysing the tools and capabilities in place.</li>
<li>Facilitates the formalisation of a risk reduction plan and the management of resilience by highlighting the main areas that require more investment.</li>
<li>Integrates all Wavestone&#8217;s field experience in resilience from all our offices! Especially in the UK, where Operational Resilience is more advanced than the European Union countries, we have been working on resilience projects for over 3 years.</li>
</ul>
<p style="text-align: justify;">It assesses the organisation’s processes and operational implementation with a form consisting of <strong>ninety questions spanning twelve major topics</strong>. For each question, a resilience score between 0 and 5 is assigned, and a list of evidence is provided to support this score.</p>
<p style="text-align: justify;">Customers are always keen to benchmark, and this has been incorporated into the assessment. Everything has been thought out to standardise the evaluations and thus allow clients to position themselves in the market; it&#8217;s a real value-add!</p>
<p style="text-align: justify;">As the regulatory landscape matures, we&#8217;ve identified a need to maintain a global view; firms must implement Horizon Scanning functions to stay ahead of regulators and the competition. Therefore, working in conjunction with our maturity assessment tool, we have an Operational Resilience Regulatory Radar which maps regulations across the globe according to the same themes. It is a live document, updated every quarter that provides a holistic view of OpRes regulation and allows the user to compare by both geography and topic.</p>
<h4 style="text-align: justify;"><span style="color: #800080;">Can you tell us about the last time you used it?</span></h4>
<p style="text-align: justify;"><strong>The trigger for the creation of the <em>Operational Resilience Maturity Assessment</em> was a UK project</strong> supporting a major bank. Initially, we provided a 360° analysis of their resilience during which we developed our first assessment framework. With it, we were able to establish four maturity levels of resilience: 1) &#8220;Insufficient&#8221;, 2) &#8220;Compliant&#8221;, 3) &#8220;Good Level&#8221; and 4) &#8220;Leader&#8221;. We were then able to position them on these 4 levels and provide relevant advice and feedback accordingly.</p>
<p style="text-align: justify;">Recently, we received a second assignment from another banking company, providing an opportunity to modify the assessment and make it more precise and extensive. We also modified our list of proofs that are used to position an organization against the correct maturity level, and added a 5th level of maturity, &#8220;The Pioneer&#8221;.</p>
<p style="text-align: justify;"><strong>Currently, we use this framework in the financial sector, which has a high level of maturity given the regulatory constraints and the sensitivity of the data it processes. For clients in other sectors, we would adapt the levels to align with the overall maturity of the market.</strong></p>
<h4 style="text-align: justify;"><span style="color: #800080;">Any final thoughts?</span></h4>
<p style="text-align: justify;">We think we can go even further in assessing resilience in a few years. The more feedback we get from the field, the more precise we will be on the required conditions to reach a level. For example, a player will be considered mature if it has the capacity to rebuild its AD in 3 hours. Just like on the CyberBenchmark. The next step would therefore be to define quantitative and/or qualitative indicators&#8230; And the only way to do this is to continue to confront the framework with reality!</p>
<p style="text-align: justify;">Although everything can be improved, we are still very proud of this tool which was built in collaboration with our customers and experts, and has already proved its worth.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/interview-operational-resilience-how-to-recover-after-an-attack/">[INTERVIEW] Operational resilience, how to recover after an attack!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/04/interview-operational-resilience-how-to-recover-after-an-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DORA: challenges and opportunities</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/dora-challenges-and-opportunities/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/dora-challenges-and-opportunities/#respond</comments>
		
		<dc:creator><![CDATA[Roxane Bohin]]></dc:creator>
		<pubDate>Mon, 27 Feb 2023 11:00:00 +0000</pubDate>
				<category><![CDATA[Challenges]]></category>
		<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Digital Operational Resilience Act]]></category>
		<category><![CDATA[DORA]]></category>
		<category><![CDATA[financial services]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19852</guid>

					<description><![CDATA[<p>DORA, in a nutshell The European Union published the Digital Operational Resilience Act, or “DORA”, on December 27th, 2022, and it entered into force on January 16th, 2023. It sets new rules for financial entities and their ICT third-party service providers...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/dora-challenges-and-opportunities/">&lt;strong&gt;&lt;u&gt;DORA: challenges and opportunities&lt;/u&gt;&lt;/strong&gt;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[


<h3 style="text-align: justify;"><strong><u>DORA, in a nutshell</u></strong></h3>
<p style="text-align: justify;">The European Union published the Digital Operational Resilience Act, or “DORA”, on December 27<sup>th</sup>, 2022, and it entered into force on January 16<sup>th</sup>, 2023. It sets new rules for financial entities and their ICT third-party service providers in terms of ICT resilience. Compliance to the text will be mandatory starting January 17<sup>th</sup>, 2025.</p>
<p style="text-align: justify;">The Digital Operational Resilience Act aims at simplifying and improving the resilience of financial service organisations by establishing a robust regulatory framework and oversight body. As previously shared in details, in our article <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">Decrypting DORA: what does it mean for resilience of financial organisations?</a>, it introduces requirements across five pillars: </p>
<ul style="text-align: justify;">
<li>ICT risk management</li>
<li>ICT-related incident management, classification and reporting​</li>
<li>Digital Operational resilience testing</li>
<li>Managing of ICT third-party risk​</li>
<li>Information and intelligence sharing (optional)</li>
</ul>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-19883" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-1.png" alt="" width="500" height="499" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-1.png 710w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-1-191x191.png 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-1-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-1-300x300.png 300w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p style="text-align: center;"><u>Main DORA topics and articles applying to financial entities <br />(article references between brackets)​</u></p>
<p style="text-align: justify;">When analysing the content of the regulation and while taking into account the current maturity of the financial sector, the complexity largely differs depending on the topic addressed. As ICT frameworks are already a best practice widely adopted within the financial services sector, the effort will mainly focus on bringing more consistency across the organization. Similarly, ICT-related incident management has already integrated within its processes and tools numerous regulatory constraints in terms of classification and notification. Consequently, integrating the DORA requirements should not present major difficulties.</p>
<p style="text-align: justify;">Nevertheless, meeting the requirements to be compliant will still have its challenges… And opportunities!</p>
<h3 style="text-align: justify;"><strong><u>An ambitious regulation that puts the finger on known fragilities </u></strong></h3>
<p style="text-align: justify;">The first challenge for many organisations will be to <span style="color: #800080;"><strong>onboard the top management in the initiative</strong></span>. As DORA appoints them as accountable for monitoring, approving, reviewing, and setting the direction in terms of operational resilience, their involvement is key to the success of a potential program. Early onboarding will allow to gain precious time in identifying and validating critical functions in the scope, prioritizing the main threat scenarios, and set the pace on the topic. However, this will imply for the teams to carefully think about the proper and comprehensible KPIs and KRIs to report on the operational resilience level of the organization. As much as possible, give them quickly an overview of the regulation content and their expected role in this context!</p>
<p style="text-align: justify;">The second challenge will be to <span style="color: #800080;"><strong>raise the bar in terms of third-party risk management</strong></span>. Large organisations often have hundreds, if not thousands of third-party providers implying a fastidious sorting to focus on the most critical. Third-party operational resilience risk management mainly relies today on integrating steps within the purchasing processes and, in the end, including specific clauses within the contracts. DORA asks for more with responsibility falling on financial services to make sure third-party compliance to these requirements are met. It also requires working on potential exit strategies and joint testing where relevant. This step up may define a shift in how business is done with suppliers in the future and should be anticipated by the concerned third parties to be able to provide proofs of their operational resilience risk management.</p>
<p style="text-align: justify;">Finally,<span style="color: #800080;"><strong> testing is a crucial point and a challenge</strong></span> within DORA. Organisations will need to structure and regularly test their resilience to continually assess risks and the suitability of their resilience strategies. It requires to gain a strategic vision on the topic, which rarely pre-exists as the tests are often managed in silos (vulnerability tests, penetration tests, business continuity tests…). In this context, they will also need to ensure the proper coverage of their critical functions over the years within the testing approach. Organizations are also expected to conduct threat-led penetration tests in live production every three years at least and potentially including ICT third-party providers.</p>
<p style="text-align: justify;">Overcoming these challenges will not be an easy journey. It is key to start working on these topics quickly as they will ask for true changes for the concerned organizations. Obviously, a detailed gap analysis with the regulation requirements is a good starting point.</p>
<h3 style="text-align: justify;"><strong><u>Resilience first, compliance second?</u></strong></h3>
<p style="text-align: justify;">Clearly, a regulation such as DORA brings along opportunities for those who will try to see beyond the compliance constraints.</p>
<p style="text-align: justify;"><span class="TextRun Highlight SCXW76254484 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW76254484 BCX0" data-ccp-charstyle="ui-provider" data-ccp-charstyle-defn="{&quot;ObjectId&quot;:&quot;16be60d5-1f9f-426b-a91f-8257aa73fac2|126&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[469775450,&quot;ui-provider&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;ui-provider&quot;,335572020,&quot;1&quot;,469778324,&quot;Default Paragraph Font&quot;]}">First, the regulation introduces a holistic approach to ICT risk management that could bring more consistency across the organizations. It could constitute a first step in putting together a unified framework, allowing a better assessment of the organization’s ICT risks and simplifying overall reporting to the top management. It could also initiate the idea of a converged governance on ICT risk management gathering cybersecurity, business continuity and IT service continuity.</span></span><span class="EOP SCXW76254484 BCX0" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;">Second and foremost, it is a unique opportunity to work on your real resilience level by asking yourself complex questions. If you were to face a no-IT situation tomorrow, would your organization survive? Would your existing capabilities fully cover the needs that such situation asks for? And are you confident that your resilience solution would work on D-day?</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/dora-challenges-and-opportunities/">&lt;strong&gt;&lt;u&gt;DORA: challenges and opportunities&lt;/u&gt;&lt;/strong&gt;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/dora-challenges-and-opportunities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MI and tooling at the heart of operational resilience management, Roxane Bohin interview</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/12/mi-and-tooling-at-the-heart-of-operational-resilience-management-roxane-bohin-interview/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/12/mi-and-tooling-at-the-heart-of-operational-resilience-management-roxane-bohin-interview/#respond</comments>
		
		<dc:creator><![CDATA[Roxane Bohin]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 13:09:38 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[steering]]></category>
		<category><![CDATA[tooling]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17457</guid>

					<description><![CDATA[<p>Roxane, could you please introduce us with the operational resilience management? Dashboards and KPIs that convey concrete messages and calls for action are often what drives the success of operational resilience initiatives. Operational resilience brings together and harmonises multiple disciplines...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/mi-and-tooling-at-the-heart-of-operational-resilience-management-roxane-bohin-interview/">MI and tooling at the heart of operational resilience management, Roxane Bohin interview</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1><strong>Roxane, could you please introduce us with the operational resilience management?</strong></h1>
<p>Dashboards and KPIs that convey concrete messages and calls for action are often what drives the success of operational resilience initiatives.</p>
<p>Operational resilience brings together and harmonises multiple disciplines that were previously managed in silos: business continuity, IT and disaster recovery, incident and crisis management (IT, business and cyber), cyber defence, third party management, and operational risk management.</p>
<p>In order to coordinate and orchestrate these disciplines effectively to establish an accurate picture of the overall resilience, companies need to analyse their data in relation to these topics. This requires a complete mapping of critical services (Important Business Services), their dependencies (business processes, applications, suppliers, teams, buildings, etc.) and testing.</p>
<p>To make this possible, there is a real need for tools and automation. This is also why we are seeing more end-to-end solutions for operational resilience management emerging in the market, from specialist vendors such as Fusion Risk Management, Castellan to non-specialist ones, such as ServiceNow.</p>
<p> </p>
<h1><strong>What are the challenges in the field? </strong></h1>
<p>Depending on the company’s maturity, each stage of the process may pose challenges or difficulties.</p>
<h2><strong>Challenge 1: Data Model</strong></h2>
<p>The operational resilience data model must be created in consideration of Important Business Services and their respective dependencies. Preferably, an organisation would reuse existing inventories (e.g. CMDB, supplier inventories, BIAs, HR systems, etc.) and run workshops to leverage on the knowledge of their business representatives and IT experts, suppliers, etc. The challenge stems from the need to rationalise all the elements into a format that enables data analysis. This means that even if one starts with Excel, it is important to firstly define the precise rules (common referencing system, one piece of information per line, etc.).</p>
<p> </p>
<h2><strong>Challenge 2: Identifying gaps </strong></h2>
<p>Once this mapping is carried out, companies need to identify threats linked to the end-to-end service and existing resilience capabilities to mitigate them. These capabilities can be specific to a dependency or broader. This allows the creation of indicators that show resilience gaps. Overall, there can be two types of gaps:</p>
<p> </p>
<ol>
<li>
<h3>A dependency with insufficient contingency plans</h3>
</li>
</ol>
<p>This can be identified in the initial analysis, through existing controls, or through testing.</p>
<p>Example: A person wants to withdraw cash. Normally, this service is available through an ATM. Several elements are necessary for ‘normal’ service to function properly:</p>
<ul>
<li>Physical ATM itself</li>
<li>Customer authentication system via their bank card</li>
<li>Customer account management software provided by a third party to check the balance</li>
</ul>
<p>The following threats may affect this service:</p>
<ul>
<li>Major IT loss (whether or not caused by a cyberattack)</li>
<li>Loss of the software provider</li>
<li>Physical incident affecting the ATM</li>
</ul>
<p>We shall assume that 4 hours is the period before the inability to withdraw cash becomes an intolerable source of harm to the customer – which is also known as the impact tolerance). With this context in mind, the bank needs to consider the following questions to identify resilience gaps:</p>
<ul>
<li><strong>Recovery Time Objective (RTO):</strong> In the event of a computer loss, can the ATM and authentication system be brought back online within 4 hours according to their RTO? Has it been tested?</li>
<li><strong>Exit plan</strong>: In the event of a major breakdown or bankruptcy of the account management software provider, is there an alternate provider the bank can turn to for delivering the service without intolerable delay? Alternatively, is there a way to bring the activities in-house?</li>
<li><strong>Contingencies</strong>: Is there a degraded process for dispensing cash, for example, by replacing a faulty ATM? What are the dependencies for this process? Can it be done without an IT system?</li>
</ul>
<p>Once these gaps have been identified, you can then calculate resilience scores for individual components.</p>
<p> </p>
<ol start="2">
<li>
<h3>Absence of a core resilience capability</h3>
</li>
</ol>
<p>A range of operational resilience capabilities is needed in every organisation, which includes business and IT continuity, third party management, cyber defence, disaster recovery and crisis management. We have identified a list of 50 generic core capabilities, linked to the most common threats, and are deploying this framework with our clients to measure the overall operational resilience maturity level.</p>
<p>Examples of key capabilities include:</p>
<ul>
<li>Crisis management: alternative communication channel</li>
<li>Disaster recovery: Cyber vault</li>
<li>Third party management: Crisis SLAs with third parties</li>
<li>Business and IT continuity: degraded processes without IT</li>
<li>Cyber defence: emergency authentication procedure</li>
</ul>
<p> </p>
<h2><strong>Challenge 3: Governance </strong></h2>
<p>Finally, governance is required to ensure that operational resilience data is maintained up to date, such that accurate reporting can be delivered to aid decision-making in the right forums. For instance, any initiatives to remediate identified resilience gaps requires management buy-in and funding, and management can only make the right decision and prioritise initiatives based on what is being reported on official reports.</p>
<h2>Finally, what should be measured? </h2>
<p>The underlying question in MI is: how well is your organisation prepared to withstand a major incident?</p>
<ul>
<li>Are the dependencies identified?</li>
<li>Are the necessary documentations in place?</li>
<li>Are the threats known?</li>
<li>Are controls in place to indicate a gap?</li>
<li>Are the company&#8217;s employees prepared to respond and minimise the operational impact of a major incident?</li>
</ul>
<p> </p>
<h1><strong>What are customers&#8217; expectations?</strong></h1>
<p>As of today, through supporting our clients in their Operational Resilience program, we have identified three common themes with regards to our clients’ expectations around operational resilience projects:         </p>
<ol>
<li>Clients need help with creating an inventory and rationalising multiple sources with various data formats to be incorporated into the data model.</li>
<li>Clients regularly require support with creating reporting. This can be in the form of designing useful KPIs that can be translated into actionable items and a driver for decision-making process, or creating dashboards in data visualisation tools such as PowerBI.</li>
<li>There is an increasing demand for sourcing and deployment of operational resilience tools. Wavestone can help companies find the right tool that suits their needs via:
<ul>
<li>Performing a benchmark</li>
<li>Gathering requirements and specifications through workshops with future users</li>
<li>Creating an RFP and a suitable scoring mechanism to evaluate vendors</li>
</ul>
</li>
</ol>
<p>In fact – a great example showcasing our expertise around this particular area around helping our clients with sourcing and the deployment of operational resilience tools would be Wavestone’s second edition of the <a href="https://www.wavestone.com/en/insight/operational-resilience-tooling-panorama-2021/">Operational Resilience Tooling Panorama</a> – it captures the main market players across a range of topics such as emergency notifications, resilience management (mapping, testing, dashboards), crisis management and business or cyber incident simulation (cyber range). The radar is also built to encompass a wide spectrum of players – from disruptive innovators to traditional players, and from start-ups to large organisations.  </p>
<p> </p>
<h1><strong>Any final advice for readers? </strong></h1>
<p>For French clients who have not yet launched an operational resilience program, there are two pieces of advice:</p>
<ul>
<li>As soon as the mapping is done, you need to think about how to store the data (i.e. the data model). Excel may not be sufficient as a tool to ensure the sustainability of the model</li>
<li>Do not hesitate to re-use what your company already has in terms of business and IT continuity, third party management, cyber defence, IT reconstruction and crisis management.</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/mi-and-tooling-at-the-heart-of-operational-resilience-management-roxane-bohin-interview/">MI and tooling at the heart of operational resilience management, Roxane Bohin interview</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/12/mi-and-tooling-at-the-heart-of-operational-resilience-management-roxane-bohin-interview/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Decrypting DORA: what does it mean for Resilience of financial organisations?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/</link>
		
		<dc:creator><![CDATA[Roxane Bohin]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 14:51:32 +0000</pubDate>
				<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[Digital compliance]]></category>
		<category><![CDATA[DORA]]></category>
		<category><![CDATA[Financial regulation]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14837</guid>

					<description><![CDATA[<p>With the release of the Digital Operational Resilience Act (DORA), the European Union is taking a strong stand to strengthen the financial sector’s resilience to ICT-related major incidents. With prescriptive requirements on both financial entities and critical ICT services provider, and an aggressive timeline...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">Decrypting DORA: what does it mean for Resilience of financial organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><span data-contrast="auto">With the release of the Digital Operational Resilience Act (DORA), the European Union is taking a strong stan</span><span data-contrast="auto">d</span><span data-contrast="auto"> to strengthen</span><span data-contrast="auto"> the financial sector’s</span><span data-contrast="auto"> resilience to ICT</span><span data-contrast="auto">-related</span><span data-contrast="auto"> major incidents. With prescriptive requirements on both financial entities and critical ICT services provider, and an aggressive timeline for compliance (estimated at the end of 2022), organisations must start planning now. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">Why Digital Operational Resilience Act (DORA)?</h2>
<p style="text-align: justify;"><span data-contrast="auto">DORA is p</span><span data-contrast="auto">art of </span><span data-contrast="auto">an </span><span data-contrast="auto">EU-wide “Digital Finance Package”, aimed at </span><span data-contrast="auto">making sure the financial sector can </span><span data-contrast="auto">levera</span><span data-contrast="auto">ge</span><span data-contrast="auto"> opportunities brought by technology</span><span data-contrast="auto"> and innovation</span><span data-contrast="auto"> whilst mitigating </span><span data-contrast="auto">the </span><span data-contrast="auto">new risks</span><span data-contrast="auto"> associated.</span><span data-contrast="auto"> </span><span data-contrast="auto">This package involves regulation on crypto assets, blockchain technology, and digital operational resilience. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">With </span><span data-contrast="auto">the Digital Operational Resilience Act</span><span data-contrast="auto">, the EU aims to make sure financial organisations mitigate the risks arising from increasing reliance on ICT systems and third parties for critical operations</span><span data-contrast="auto">. Organisations</span><span data-contrast="auto"> need to be able </span><span data-contrast="auto">to </span><span data-contrast="auto">“</span><span data-contrast="auto">withstand, respond and recover</span><span data-contrast="auto">”</span><span data-contrast="auto"> from </span><span data-contrast="auto">the </span><span data-contrast="auto">impacts of ICT incidents</span><span data-contrast="auto">, thereby continuing to deliver </span><span data-contrast="auto">critical and important functions </span><span data-contrast="auto">and minimising</span><span data-contrast="auto"> disruption for customers and for the financial system.</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">This means establishing </span><span data-contrast="auto">robust </span><span data-contrast="auto">measures and controls on systems</span><span data-contrast="auto">, </span><span data-contrast="auto">tools</span><span data-contrast="auto"> and third parties,</span><span data-contrast="auto"> </span><span data-contrast="auto">having the right continuity plans in place, and testing their effectiveness. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This global, large scope regulation </span><span data-contrast="auto">is coming in</span><span data-contrast="auto"> to rationalise an increasingly fragmented regulatory landscape on the topic</span><span data-contrast="auto">, with a number of </span><span data-contrast="auto">local regulatory initiatives </span><span data-contrast="auto">in member states </span><span data-contrast="auto">and smaller scope EU guidelines </span><span data-contrast="auto">on related topics (e.g. testing requirements, </span><span data-contrast="auto">management of ICT third party dependencies</span><span data-contrast="auto">, cyber resilience</span><span data-contrast="auto">)</span><span data-contrast="auto">.</span><span data-contrast="auto"> Setting up a global regulatory framework will </span><span data-contrast="auto">ensure</span><span data-contrast="auto"> there are no overlaps or gaps in regulation and </span><span data-contrast="auto">maintain good conditions for</span><span data-contrast="auto"> </span><span data-contrast="auto">competition in the single market.</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">DORA </span><span data-contrast="auto">also </span><span data-contrast="auto">fits into </span><span data-contrast="auto">a </span><a href="https://uk.wavestone.com/en/insight/navigating-through-the-resilience-frameworks-how-to-identify-the-right-frameworks-to-use/"><span data-contrast="none">worldwide </span><span data-contrast="none">trend </span><span data-contrast="none">in regulation on resilience</span><span data-contrast="none"> for the financial sector</span></a><span data-contrast="auto">, </span><span data-contrast="auto">pioneered by the </span><a href="https://www.bankofengland.co.uk/prudential-regulation/publication/2018/building-the-uk-financial-sectors-operational-resilience-discussion-paper"><span data-contrast="none">Bank of England</span><span data-contrast="none">’s </span><span data-contrast="none">(FCA and PRA) </span><span data-contrast="none">consultation papers</span></a><span data-contrast="auto"> on operational resilience and impact tolerances, and </span><span data-contrast="auto">followed</span><span data-contrast="auto"> by</span><span data-contrast="auto"> principle-based papers </span><span data-contrast="auto">on operational resilience </span><span data-contrast="auto">from the </span><a href="https://www.bis.org/bcbs/publ/d509.htm"><span data-contrast="none">Bank of International Settlements</span><span data-contrast="none"> (BIS)</span></a><span data-contrast="auto"> and the </span><a href="https://www.federalreserve.gov/newsevents/pressreleases/bcreg20201030a.htm"><span data-contrast="none">Federal Reserve</span></a><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">DORA in a nutshell: what does it change?</h2>
<p style="text-align: justify;"><span data-contrast="auto">Contrary to the FCA/PRA</span><span data-contrast="auto">, the Federal Reserve</span><span data-contrast="auto"> and the BIS, </span><span data-contrast="auto">DORA focuses on </span><span data-contrast="auto">solely </span><span data-contrast="auto">resilience to I</span><span data-contrast="auto">CT-related incidents and </span><span data-contrast="auto">introduces very specific and prescriptive requirements. It is not just a set of guidelines but rather criteria, templates and </span><span data-contrast="auto">instructions that will shape how financial organisations manage ICT risk. It demonstrates that EU regulators want to be very hands-on </span><span data-contrast="auto">on</span><span data-contrast="auto"> th</span><span data-contrast="auto">e</span><span data-contrast="auto"> topic, with a lot of reporting, communication and assessments that need to happen frequently</span><span data-contrast="auto">,</span><span data-contrast="auto"> enabled by standardised MI and reporting. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">DORA</span><span data-contrast="auto"> </span><span data-contrast="auto">introduces requirements</span><span data-contrast="auto"> across </span><span data-contrast="auto">five pillars: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">ICT risk management</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">ICT incident reporting</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Digital Operational resilience testing</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">ICT third-party risk management </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Information and intelligence sharing</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<figure id="post-14838 media-14838" class="align-none" style="text-align: justify;"><img decoding="async" class=" wp-image-14838 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/Image-1-1.png" alt="" width="539" height="568" /></figure>
<p style="text-align: justify;"><span data-contrast="auto">S</span><span data-contrast="auto">ome of the requirements are straight-forward and largely built on what is already being done in organisations</span><span data-contrast="auto"> (</span><span data-contrast="auto">for example, </span><span data-contrast="auto">the risk management framework that needs to be developed is similar to </span><span data-contrast="auto">industry standard</span><span data-contrast="auto">s like</span><span data-contrast="auto"> NIST</span><span data-contrast="auto">)</span><span data-contrast="auto">; but some are also challenging and will mean organisations need to launch some work to be compliant. </span><span data-contrast="auto">We have summarised the</span><span data-contrast="auto"> requirements and the</span><span data-contrast="auto">se key challenges</span><span data-contrast="auto"> </span><span data-contrast="auto">to start addressing now </span><span data-contrast="auto">for each of the 5 pillars</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">1. ICT risk management</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">E</span><span data-contrast="auto">nsure</span><span data-contrast="auto"> specific measures </span><span data-contrast="auto">and controls </span><span data-contrast="auto">are in place to limit the disruption</span><span data-contrast="auto"> to the market and to consumers</span><span data-contrast="auto"> caused by incidents</span><span data-contrast="auto">,</span><span data-contrast="auto"> and ensure accountability of the management body</span><span data-contrast="auto"> on ICT risk management</span><span data-contrast="auto">. </span><b><span data-contrast="auto"> </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key</span></b><b><span data-contrast="auto"> requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">Firms will need to follow </span><span data-contrast="auto">governance </span><span data-contrast="auto">principles </span><span data-contrast="auto">around ICT risk, with </span><span data-contrast="auto">a focus on </span><span data-contrast="auto">accountability of the management body</span><span data-contrast="auto">. They will need to i</span><span data-contrast="auto">denti</span><span data-contrast="auto">fy their</span><span data-contrast="auto"> risk tolerance for ICT risk, based on</span><span data-contrast="auto"> the</span><span data-contrast="auto"> risk appetite of the organisation and the impact tolerance of ICT disruptions</span><span data-contrast="auto">. They will also need to </span><span data-contrast="auto">have a risk management framework in place that </span><span data-contrast="auto">includes identification of critical and important functions</span><span data-contrast="auto">, risks associated </span><span data-contrast="auto">and </span><span data-contrast="auto">a mapping of the</span><span data-contrast="auto"> ICT assets that underpin them</span><span data-contrast="auto">;</span><span data-contrast="auto"> </span><span data-contrast="auto">as well as </span><span data-contrast="auto">specific</span><span data-contrast="auto"> protectio</span><span data-contrast="auto">n, </span><span data-contrast="auto">prevention</span><span data-contrast="auto">, detection, response and recovery</span><span data-contrast="auto"> </span><span data-contrast="auto">plans and </span><span data-contrast="auto">capabilities</span><span data-contrast="auto">, continuous improvement processes and metrics, and a crisis communication strateg</span><span data-contrast="auto">y</span><span data-contrast="auto"> with clear roles and responsibilities</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">: </span></b><span data-contrast="auto">As part of the continuous improvement processes,</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">DORA introduces compulsory training on digital operational resilience for the management body but also for the whole staff, as part of their general training package. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">2. ICT incident reporting</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><span data-contrast="auto"> Harmonise and centralise reporting of incidents to enable the regulator to react fast to avoid </span><span data-contrast="auto">spreading of the impact, and to promote collective improvement and</span><span data-contrast="auto"> firms’</span><span data-contrast="auto"> knowledge of </span><span data-contrast="auto">current </span><span data-contrast="auto">threats to the market</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">DORA introduces a standard incident classification methodology with a set of </span><span data-contrast="auto">specific </span><span data-contrast="auto">criteria</span><span data-contrast="auto"> </span><span data-contrast="auto">(</span><span data-contrast="auto">number of users</span><span data-contrast="auto"> affected</span><span data-contrast="auto">, duration, </span><span data-contrast="auto">geographical spread</span><span data-contrast="auto">, data loss, severity of impact on ICT systems, criticality of services affected, economic impact) with thresholds </span><span data-contrast="auto">that are yet to be published. </span><span data-contrast="auto">Following this methodology, incidents classified as m</span><span data-contrast="auto">ajor will have to be reported to the regulator within the same business day, following a certain template. </span><span data-contrast="auto">Follow-up reporting will also be required after a week, and after a month. </span><span data-contrast="auto">These reports will all be anonymised, compiled, and released regularly to the whole community. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">F</span><span data-contrast="auto">irms will need to change their incident classification </span><span data-contrast="auto">methodology</span><span data-contrast="auto"> to fit with the requirements. They will also need to set up the right processes</span><span data-contrast="auto"> and channels</span><span data-contrast="auto"> to be able to notify the regulator fast in case a major incident occurs. Based on what gets classified as “major”, this might happen frequently. </span><span data-contrast="auto">To help organisations prepare, w</span><span data-contrast="auto">e anticipate that the incident classification methodology will align with the </span><a href="https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy"><span data-contrast="none">ENISA Reference Incident Classification Taxonomy</span></a><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">3. Digital Operational Resilience testing</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><span data-contrast="auto"> </span><span data-contrast="auto">Ensure that </span><span data-contrast="auto">financial entities t</span><span data-contrast="auto">est the efficiency of the risk </span><span data-contrast="auto">management framework and measures in place</span><span data-contrast="auto"> to respond </span><span data-contrast="auto">to </span><span data-contrast="auto">and recove</span><span data-contrast="auto">r from</span><span data-contrast="auto"> </span><span data-contrast="auto">a wide range of</span><span data-contrast="auto"> ICT</span><span data-contrast="auto"> incident </span><span data-contrast="auto">scenario</span><span data-contrast="auto">s</span><span data-contrast="auto">,</span><span data-contrast="auto"> with minimal disruption to critical and important functions</span><span data-contrast="auto">, in a way that is proportionate to their size and criticality for the market.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">With DORA, all firms must put in place a c</span><span data-contrast="auto">omprehensive testing programme, </span><span data-contrast="auto">including a range of assessments, tests, methodologies, practices and tools</span><span data-contrast="auto">, </span><span data-contrast="auto">with a focus on technical testing</span><span data-contrast="auto">.</span><span data-contrast="auto"> The most critical firms</span><span data-contrast="auto"> will also have to organise a l</span><span data-contrast="auto">arge-scale threat-led live </span><span data-contrast="auto">penetration </span><span data-contrast="auto">test</span><span data-contrast="auto"> every 3 years</span><span data-contrast="auto"> (red team</span><span data-contrast="auto"> type exercise</span><span data-contrast="auto">)</span><span data-contrast="auto">, </span><span data-contrast="auto">performed by independent testers</span><span data-contrast="auto">, </span><span data-contrast="auto">covering critical functions and services and involving EU</span><span data-contrast="auto">-based</span><span data-contrast="auto"> ICT </span><span data-contrast="auto">third parties</span><span data-contrast="auto">. </span><span data-contrast="auto">The scenario will have to be agreed by the regulator in advance and </span><span data-contrast="auto">firms will receive a compliance certificate upon </span><span data-contrast="auto">completion of the test</span><span data-contrast="auto">. </span><span data-contrast="auto">More guidance for these tests, as well as the criteria which defines a critical firm,</span><span data-contrast="auto"> will be published in 2021.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">It is likely that c</span><span data-contrast="auto">ritical firms will need to organise this threat-led penetration test by </span><span data-contrast="auto">the end of </span><span data-contrast="auto">2024 and this type of test</span><span data-contrast="auto"> requires a lot of preparation. </span><span data-contrast="auto">The fact that it needs to involve critical ICT third parties will also mean they need to be involved in the preparation. </span><span data-contrast="auto">Firms </span><span data-contrast="auto">that believe they will be in scope </span><span data-contrast="auto">(</span><span data-contrast="auto">might be</span><span data-contrast="auto"> </span><span data-contrast="auto">firms already in the scope of NIS regulation) </span><span data-contrast="auto">should start thinking about the scenario as soon as possible to enable validation with the regulator at least 2 years before the deadline. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">4. ICT third party risk management</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">Ensure that financial organisations have an appropriate level of control</span><span data-contrast="auto">s</span><span data-contrast="auto"> and monitoring </span><span data-contrast="auto">of </span><span data-contrast="auto">their ICT third parties, especially the ones that underpin critical</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">functions</span><span data-contrast="auto">; and set up specific oversight on providers that are critical to the market as a whole. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements: </span></b><span data-contrast="auto">With this regulation, the EU </span><span data-contrast="auto">introduces </span><span data-contrast="auto">requirements on both financial organisations and critical ICT providers.</span><b><span data-contrast="auto"> </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="9" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Financial organisations</span></b><span data-contrast="auto"> will need to have a defined multi-vendor ICT third-party risk strategy and policy owned by a member of the management body.</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">They will need to compile a standard register of information that contains the full view of all their ICT third-party providers, the services they provide and the functions </span><span data-contrast="auto">they</span><span data-contrast="auto"> underpin</span><span data-contrast="auto">; and report on changes to this register to the regulator once a year. They will need to </span><span data-contrast="auto">assess ICT service providers according to certain criteria before entering a contract (e.g. security level, </span><span data-contrast="auto">concentration risk, sub-outsourcing risks), and they will need to plan for an exit strategy in case of failure of a provider. </span><span data-contrast="auto">DORA also contains guidelines for contract contents </span><span data-contrast="auto">and reasons for termination of contract, which has to be linked to a risk or evidence of non-compliance at the provider level. </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="9" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Under a new Oversight Framework,</span><b><span data-contrast="auto"> critical providers </span></b><span data-contrast="auto">will </span><span data-contrast="auto">be the subject of a</span><span data-contrast="auto">nnual a</span><span data-contrast="auto">ss</span><span data-contrast="auto">essments against resilience requirements such as availability, continuity, data integrity, physical security, risk management processes, governance, reporting, </span><span data-contrast="auto">portability, testing… These assessments will be performed directly by the regulator </span><span data-contrast="auto">and will result in penalties for non-compliance. </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">: </span></b><span data-contrast="auto">Collating information on </span><span data-contrast="auto">all ICT vendors</span><span data-contrast="auto"> (not only the most critical)</span><span data-contrast="auto">,</span><span data-contrast="auto"> with the</span><span data-contrast="auto"> services provided and functions they underpin</span><span data-contrast="auto"> for the register of information</span><span data-contrast="auto"> will be a </span><span data-contrast="auto">very </span><span data-contrast="auto">big task for large financial organisations that</span><span data-contrast="auto"> </span><span data-contrast="auto">typically </span><span data-contrast="auto">rely on</span><span data-contrast="auto"> </span><span data-contrast="auto">thousands of</span><span data-contrast="auto"> big and</span><span data-contrast="auto"> small providers</span><span data-contrast="auto"> and legacy contract management systems</span><span data-contrast="auto"> that make it difficult to mine data from</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">5. Information and intelligence sharing</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">Promote sharing of information and intelligence on cyber threats between financial organisations to enable them to be better prepared. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">DORA introduces guidelines on setting up information sharing arrangements between firms for cyber threats</span><span data-contrast="auto">, including confidentiality requirements and the need to notify the regulator. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">We do not see any particular challenge in this space as many organisations already have such agreements in place. </span><span data-contrast="auto">It will be an opportunity to make local initiatives</span><span data-contrast="auto">, </span><span data-contrast="auto">networks</span><span data-contrast="auto"> or</span><span data-contrast="auto"> associations</span><span data-contrast="auto"> visible and</span><span data-contrast="auto"> </span><span data-contrast="auto">encourage more companies to become part of them. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 style="text-align: justify;">What happens next?</h2>
<p style="text-align: justify;"><span data-contrast="auto">DORA is currently going through the EU legislative process an</span><span data-contrast="auto">d it is expected to take 6-</span><span data-contrast="auto">12</span><span data-contrast="auto"> months before it becomes law. </span><span data-contrast="auto">A</span><span data-contrast="auto"> few questionable topics might lead to some debates and slow down the process, especially on third-party management</span><span data-contrast="auto">: </span><span data-contrast="auto">restrictive criteria for organisations to terminate contracts, banned non-EU based critical third parties, penalty system and financing of the Oversight framework by the critical providers</span><span data-contrast="auto">. </span><span data-contrast="auto">There are also details that still need to be published to clarify some of the requirements</span><span data-contrast="auto"> (e.g. templates, criticality criteria and thresholds…), which might also create some debates. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Once DORA is passed, firms </span><span data-contrast="auto">should</span><span data-contrast="auto"> have one year to get into compliance </span><span data-contrast="auto">with most of the requirements (i.e. probably by the end of 2022</span><span data-contrast="auto"> – but this one-year deadline is short and we anticipate it may shift to 18 months following market feedback</span><span data-contrast="auto">) and 3 years to organise a large-scale penetration test if required (i.e. probably by the end of 2024). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">In order to be ready, </span></b><b><span data-contrast="auto">we recommend organisations</span></b><b><span data-contrast="auto"> take the following steps in 2021: </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">P</span></b><b><span data-contrast="auto">erform a maturity assessment against the </span></b><b><span data-contrast="auto">DORA requirements, with associated gap analysis and mitigation plan to reach compliance by the end of 2022</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Begin thinking about a scenario for the large-scale penetration test, aiming to get it validated by the regulator by mid-2022</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Start </span></b><b><span data-contrast="auto">work on consolidation of the register of information for all ICT third party providers</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">Decrypting DORA: what does it mean for Resilience of financial organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
