DORA – Ensuring digital resilience
Obligation for the financial sector
DORA applies to banks, insurance companies, investment firms, and IT service providers, regardless of their size.
The risks are real:
56% of countries have no cyber strategy
64% have no obligation to conduct security audits
54% have no incident reporting system
48% have no cybersecurity guidelines
Your responsibility:
Up to 2% fine of global annual turnover and personal liability of management in the event of violations.
What you need to know about DORA
What is DORA?
The Digital Operational Resilience Act (DORA) is an EU regulation (EU) 2022/2554 aimed at strengthening digital operational resilience in the financial sector. It came into force on January 16, 2023, and must be applied mandatorily from January 17, 2025. DORA aims to increase the resilience of financial companies to IT risks and to create a uniform EU-wide framework for digital resilience.
DORA takes up the requirements of related regulations such as BAIT, MaRisk, VAIT, NIS2, and ISO 27001 and combines them into a central standard. These include, in particular, obligations relating to ICT risk management, dealing with ICT incidents, managing third-party service providers, and conducting resilience tests.
The regulation also requires financial companies to review their contracts with ICT service providers and contains comprehensive provisions on contract design.
External ICT service providers that provide critical services are also subject to increased regulatory oversight by the competent authorities under DORA.
Who does DORA apply to?
DORA affects all players in the European financial sector, regardless of size or business model. These include, among others:
Credit institutions and banks
Insurance companies (property, life, health)
Reinsurance companies
Investment firms and investment companies
Insurance intermediaries and brokers
ICT service providers that support financial companies (e.g., cloud, infrastructure, or software providers)
The regulation applies to both large corporations and smaller financial service providers. The principle of proportionality allows for risk-based implementation: the requirements must be implemented in proportion to the business model and risk.
Why DORA is important
With DORA, cybersecurity becomes a strategic obligation:
Mandatory reporting requirements: Security incidents must be reported within 24 hours.
Liability risks: Management is personally responsible for compliance.
Penalties for violations: Fines of up to 2% of global annual turnover may be imposed.
Transparency requirements: Service provider risks, emergency plans, and system tests must be fully documented.
DORA requires a holistic security concept. Those who prepare themselves not only protect their data, but also their reputation.
The four core areas of DORA
ICT risk management
✔ Establishment of an effective and documented risk management system in accordance with DORA
✔ Clear accountability at management level, including regular risk reports
✔ Conducting business impact analyses (BIA) and risk analyses with reference to third-party service providers
✔ Integration von IKT-Risiken aus dem gesamten Unternehmen (inkl. BCM, Dienstleister, Testing)
✔ Integration of ICT risks from across the entire company (including BCM, service providers, testing)
✔ Obligation to regularly assess and manage risks
✔ Personal liability for negligence
✔ Clear accountability at management level
✔ Regular business impact analyses (BIA)
✔ Personal liability for violations
ICT incident reporting system
✔ Obligation to actively detect and classify incidents
✔ Detailed root cause analysis and response
✔ Reporting obligations to supervisory authorities and, if applicable, customers
Third-party ICT service providers
✔ Complete information register with criticality assessment and contractual basis
✔ Integration into ICT risk management and business impact analysis (BIA)
✔ Mandatory review and adjustment of contract clauses relating to security, contingency plans, and verifiability
✔ Regular risk assessment and evaluation of external providers
✔ Recording of all relationships with service providers in a central service provider register with criticality assessment
✔ Contracts with security requirements and verifiability
✔ Integration into BCM, risk, and reporting processes
Active review
✔ Regular penetration tests and simulations (TLPT)
✔ Documentation and proof of responsiveness
✔ Active measures for prevention and follow-up
Our webinar on DORA
Language: german
Umsetzungsschritte
Unabhängig von der gewählten Softwarelösung umfasst eine solide DORA-Umsetzung folgende Schritte:
1. Initiale Standortbestimmung
Erhebung des Reifegrads der aktuellen IT- und Sicherheitsorganisation
Definition der kritischen Geschäftsprozesse und IKT-Abhängigkeiten
2. Strategische Zieldefinition
Entwicklung einer unternehmensweiten DORA-Strategie
Integration in bestehende IT- und Compliance-Strategien
3. Organisationsstruktur & Verantwortlichkeiten
Festlegung der Verantwortlichkeit auf Leitungsebene
Aufbau eines interdisziplinären Projektteams
4. Prozesse und Richtlinien aufbauen
Etablierung von Meldeprozessen, Risikoanalysen, Testing- und Notfallplänen
Vertragsprüfung und -anpassung bei externen IKT-Dienstleistern
5. Technische Umsetzung & Werkzeugbau
Auswahl geeigneter Werkzeuge (z. B. ISMS, SIEM, CMDB)
Sicherstellung revisionssicherer Dokumentation und Nachweisführung
6. Schulung & Sensibilisierung
Ausbildung der Fachbereiche und Einführung regelmäßiger Übungen
Förderung von Security-Awareness
7. Kontrolle, Überwachung und Verbesserung
Regelmäßige Audits, Tests, Simulationen und Risikoneubewertungen
Umsetzung eines kontinuierlichen Verbesserungsprozesses (KVP)
Sind Sie bereit für Ihre DORA-Umsetzung?
Wir begleiten Sie auf dem Weg zur Compliance – mit Expertise, Best Practices und der passenden Softwarelösung.
How QSEC covers the requirements of DORA
QSEC provides the necessary infrastructure for implementing the DORA regulation in a single platform:
Central control:
Risk management, incident management, BCM, and reporting—all in one tool.
Service provider management:
Integrated, performance-based service provider registry with full auditability.
Compliance-Integration:
Coverage of BAIT, ISO 27001, VAIT, GDPR & DORA – harmonized in a single database.
Automated documentation:
Verification, test planning, reporting chains, and test protocols directly in the system.
Are you ready to implement DORA?
We will guide you on your path to compliance—with expertise, best practices, and the right software solution.
QSEC implementation concept
4-step DORA model
1. Current situation analysis
How are DORA topics already being implemented? Are there existing processes in the compliance, ISMS, or BCM team? Existing structures can often be reused—provided they meet the requirements.
2. Synergy identification
Are relevant teams already working together, or are they operating in isolation? The aim is to identify silos and avoid duplication of work. A shared database creates efficiency.
3. Harmonization
Many organizations use different systems, data sources, and tools, often without coordination. Internal harmonization is also recommended for transparency, quality, and resource conservation.
4. Management of
Ultimately, there is an obligation to provide evidence. Centralized control with QSEC allows processes, reports, and measures to be documented in a traceable manner. This reduces the likelihood of errors and saves valuable resources.
QSEC implementation.
1. Actual analysis
Recording of existing security measures and system landscape.
2. Synergy identification
Identification of redundant tools, processes, and data sources.
3. Harmonization
Consolidation into a central control system (QSEC).
4. Management of
monitoring, reporting, and continuous improvement.
Get to know QSEC better!
We will guide you through the software in approximately 60 minutes, with no obligation, and identify the potential benefits for your company.
This is how your personal QSEC web demo will proceed:
- 15-minute preliminary discussion
First, arrange a short preparatory meeting to discuss your requirements and general conditions. This will enable us to focus on your specific priorities.
Approximately 60-minute demo
- We will then arrange a detailed demo with you.
- During this time, you will receive:
- Insight into all product features
- Tailored to your priorities
- Individual consultation for you and your team
What our customers say
- In summary, we are very satisfied with the performance of QSEC and will continue to develop and use the software intensively in the future. The manufacturer of the software, Nexis GRC, is a reliable partner for us, always providing us with the best possible support thanks to its decades of experience in implementing global GRC and ISMS projects.Dr. Paul-Martin Steffen, Head of Data Protection and Information Security, DSW 21 Dortmunder Stadtwerke AG
In the end, QSEC was convincing in the cost-benefit analysis and in terms of scalability as a single-source tool. QSEC supports the dissemination of a uniform understanding of processes. The system acts as a central platform in which all business processes are recorded.
Marcel Reifenberger, Chief Information Security Officer & CSO, CANCOM SE- In Nexis GRC, we have found a partner that speaks our "language" and responds openly to our requirements and ideas. The partnership with Nexis GRC has convinced me throughout the entire duration of the collaboration.Thomas Prigge, Information Security Officer, HanseMerkur Krankenversicherung AG
- Auditing our infrastructure has become much easier and more efficient with the support of QSEC. Based on the auditors' positive assessment of the system's performance, we will continue to expand QSEC in line with our requirements.Hardy Krüger, Data Protection Officer, Information Security Officer and Head of Document Management, Harzklinikum Dorothea Christiane Erxleben GmbH
- The methods and processes already integrated in the standard QSEC have significantly supported us in the professional development and operation of our information security management system. The maturity assessment and development enable us to continuously operate, monitor and further develop our Techem ISMS with QSEC in a resource-saving manner.Sebastian Fingerloos, Head of Information Security, Techem GmbH
QSEC at a glance – your management software for DORA
What is QSEC in relation to DORA requirements?
QSEC is management software that provides comprehensive support for the most important topics covered by DORA. Particularly noteworthy is the close integration of the various subject areas made possible by QSEC. This links the topics of “ICT risk management,” “ICT third-party service providers,” “ICT incidents,” and “testing” with each other.
For example, in addition to the required outsourcing management from the chapter “ICT third-party service providers,” service providers are also directly integrated into ICT risk management. Another example would be the transfer of service providers to the business impact analysis, where they can be taken into account in resource planning with different contractual bases. The starting point for this is a central service provider directory in QSEC, which is either maintained directly there or filled via interfaces from existing systems.
Thanks to its integrated measures and evaluation functions, QSEC can also cover the active topic of “testing” to a large extent.
Important! QSEC is management software – not a technical solution for penetration tests or vulnerability scans. However, results from special tools can be integrated via API and evaluated centrally.
Selected success stories
DSW21 on the successful introduction of an Information Security Management System (ISMS) with QSEC
Cancom on the global introduction of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001 with QSEC
Techem on the challenges and experiences in information security and risk management with QSEC
Dorothea Christiane Erxleben Hospital on software-supported security management in accordance with B3S Health, ISO 27001, and GDPR with QSEC
HanseMerkur on the development of a comprehensive management system taking into account insurance law aspects in accordance with VAIT
Upcoming webinars
Grundschutz++ in 20 minutes: the BSI's next step
Date: October 29, 2025 | 4:00 p.m.
In this compact live session, Jonas Link will take you on a clear and practical introduction to the new Grundschutz++. He will show you how the requirements have fundamentally changed, what advantages the new must/should/can structure brings and why Grundschutz++ will replace the previous IT Grundschutz.
What to expect:
The most important differences to the previous IT baseline protection
The new focus on target objects instead of classic building blocks
Clear reduction and structuring of requirements
Outlook: Transition periods, next steps and practical experience