By: Aaron Severance
January 2025 promises to be a watershed moment for cyber regulatory compliance in the financial services sector.
That’s when the European Union will start enforcing the Digital Operational Resilience Act (DORA), marking the first time that the information and communication technology (ICT) systems of banks and financial institutions—and the ICT systems of third-party service providers that support them—will be governed by a comprehensive set of cybersecurity rules.
Even organizations that don’t do business in the EU will monitor how DORA enforcement plays out as they prepare for a host of new cyber resiliency rules.
Shifting to a proactive compliance strategy
With the regulatory landscape continually changing, my colleagues and I have developed a cyber regulation readiness approach to help companies anticipate, protect against, withstand and recover from ICT-related threats and disruptions while satisfying regulators’ expectations.
Here, I preview five key steps from the strategy that can close cyber regulatory gaps in your financial institution’s IT infrastructure:
1. Understand the regulatory framework
Before searching for gaps in your IT infrastructure, work with your risk and compliance department to understand how each regulation will affect the organization and how your legal team will interpret the rules.
Consider the U.S. Securities and Exchange Commission rules—adopted in July 2023—that require registered companies to report “material cybersecurity incidents” within four days of the organization determining that the incident is material.1 The regulation change doesn’t provide a definition of “material,” leaving it up to each company’s legal team to define the term and create an appropriate framework the IT department can use to report incidents when required.
Meanwhile, since regulations like DORA and the Network Information Security Directive (NIS 2)2 extend to companies that support your business, any third-party technology providers you use must also be apprised of regulations and understand how the rules affect their service delivery. Be sure to clarify whether your company assumes full responsibility for any violations of the provider’s ICT systems or if the risk is shared.