{"id":3718,"date":"2024-10-03T13:37:32","date_gmt":"2024-10-03T11:37:32","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?p=3718"},"modified":"2024-10-03T18:28:46","modified_gmt":"2024-10-03T16:28:46","slug":"simplify-your-dora-compliance-exaface","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/simplify-your-dora-compliance-exaface\/","title":{"rendered":"Simplify your DORA compliance &#8211; Exaface"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\"><strong>DORA <\/strong>wants to stop Swiper from swiping&#8230;<\/p>\n<p style=\"text-align: justify;\">Unfortunately, saying it three times is not enough to make it happen in cybersecurity.<\/p>\n<p style=\"text-align: justify;\">A European law was therefore needed to regulate the operational resilience of the financial sector: <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX%3A32022R2554\">DORA<\/a> \u201c<strong>Digital Operational Resilience Act<\/strong>\u201d.<\/p>\n<p style=\"text-align: justify;\">The ambition is much broader than IT or Cyber risk since we are talking here about operational risk, however the most important advances relate to ICT (Information and Communication Technologies).<\/p>\n<p style=\"text-align: justify;\"><strong>Financial sector = banks ?<\/strong><\/p>\n<p>No: it includes the ecosystem of insurance companies, credit institutions, services related to crypto assets, investment companies, crowdfunding service providers, among others.<\/p>\n<p>Notably, IT service providers are also affected.<\/p>\n<p><strong>What objectives?<\/strong><\/p>\n<ul>\n<li>Strengthen IT risk management<\/li>\n<li>Communicate on major incidents linked to ICT (IT INCLUDING Cyber)<\/li>\n<li>Organize the sharing of this information<\/li>\n<li>Testing the digital operational resilience of entities<\/li>\n<li>Cover risks introduced by third-party IT service providers<\/li>\n<\/ul>\n<p><strong>What deadlines ?<\/strong><\/p>\n<p>On January 17, 2025, DORA will have to be transposed by EU member states.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><a href=\"https:\/\/www.eiopa.europa.eu\/document\/download\/9f9d0023-6667-4985-a7fd-b7b3d9f6e0d9_en?filename=JC%202024-29%20-%20Final%20report_DORA%20RTS%20on%20TLPT.pdf\" target=\"_blank\" rel=\"noopener\" title=\"Official definition of TLPT DORA\">TI, TLPT, pooled TLPT, joint TPLT<\/a>&#8230; How to manage <strong>DORA&#8217;s technical requirements for testing tools and systems?<\/strong> <\/p>\n<p><a href=\"https:\/\/www.dsecbypass.com\/en\/exaface-french-easm\/\"><strong>Exaface <\/strong><\/a>helps address the following issues:<\/p>\n<ul>\n<li>Mapping and monitoring of ICT functions exposed on the Internet (EASM)<\/li>\n<li>Continuous assessment of the security level of the entity and group (CTEM)<\/li>\n<li>Third-party security assessment (TPRM)<\/li>\n<li>Recovery of threat indicators linked to attack campaigns in preparation (CTI)<\/li>\n<li>Strengthening security through the action plan to correct vulnerabilities (VM)<\/li>\n<\/ul>\n<p>It is possible to <strong>couple these services with <a href=\"https:\/\/www.dsecbypass.com\/en\/penetration-tests-pentest-security-audits-lyon\/\">penetration tests (pentests)<\/a> carried out by DSecBypass senior consultants<\/strong> in order to be compliant with article 22:<\/p>\n<blockquote>\n<p>&#8220;full range of appropriate testing, including vulnerability assessments and scans, open source software scans, network security assessments, gap scans, physical security reviews, questionnaires and scanning software solutions , source code reviews where possible, scenario-based testing, compatibility testing, performance testing, end-to-end testing or penetration testing&#8221;<\/p>\n<\/blockquote>\n<p><strong>Are you affected by DORA?<\/strong> Contact us to discuss the subject and discover our security services and products.<\/p>\n<p style=\"text-align: justify;\"><span> <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DORA wants to stop Swiper from swiping&#8230; Unfortunately, saying it three times is not enough to make it happen in cybersecurity. A European law was therefore needed to regulate the operational resilience of the financial sector: DORA \u201cDigital Operational Resilience Act\u201d. The ambition is much broader than IT or Cyber risk since we are talking [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-3718","post","type-post","status-publish","format-standard","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=3718"}],"version-history":[{"count":4,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3718\/revisions"}],"predecessor-version":[{"id":3725,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3718\/revisions\/3725"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=3718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=3718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=3718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}