Is your organisation ready for DORA?

The Digital Operational Resilience Act (DORA) came into force on Jan 17th 2025.

** Scroll down for our free DORA Readiness Assessment **

Our comprehensive 39-page guide (see below) provides practical steps to help your organisation comply with the DORA requirements.

custom-HTML

DORA READINESS ASSESSMENT

Answer the questions below to review your institution's current DORA compliance status

Click 'Generate Report' to see the results

ICT Risk Management refers to the identification, assessment, and mitigation of risks associated with information and communication technologies (ICT). This includes ensuring that ICT systems and processes are robust enough to withstand disruptions and remain secure.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5
Governance and oversight focus on ensuring that the financial institution has a well-structured approach to managing ICT risks. This includes clear accountability, the establishment of policies, and continuous monitoring of compliance.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5
ICT Security refers to the implementation of security measures designed to protect ICT systems and data from unauthorized access, cyberattacks, and other threats. It also includes ensuring the integrity and confidentiality of the financial institution’s data.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5
Incident Reporting involves the timely identification, documentation, and reporting of ICT-related incidents (e.g., data breaches, system outages) that could affect the institution’s operations or its customers.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5
Third-party Risk refers to the risk that comes from outsourcing or relying on third-party vendors and service providers for critical ICT services or operations. Compliance in this area requires managing and mitigating risks related to these external dependencies.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5
Testing and Resilience focuses on ensuring that the institution's ICT systems and processes can withstand disruptions. Regular testing (such as disaster recovery drills) is crucial to confirm that the organization can recover from various types of failures.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5
Business Continuity and Disaster Recovery involve preparing for and responding to situations where critical services or systems are disrupted. The goal is to maintain or quickly restore the institution's ability to operate, even during significant disruptions.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5
Data Protection and Security focus on ensuring that sensitive data is adequately protected from unauthorized access, loss, or corruption. Compliance with data protection regulations (e.g., GDPR) is key to safeguarding the privacy of individuals and organizations.

Score range:
1 = No Compliance, 5 = Full Compliance
1 2 3 4 5