What is DORA?
From January 2025, the Digital Operational Resilience Act (DORA) governs information security for financial institutions that do business in the European Union, particularly those regulated by central banks. That includes commercial banks, insurance companies, investment firms, and more. DORA ensures that the E.U. financial sector can withstand, respond to, and recover from Information and Communications Technology (ICT)-related disruptions and cyberattacks.
New rules around incident management and reporting, digital testing, and management of third-party risk are designed to guide financial firms in building robust security postures in the face of a threat matrix that’s constantly evolving. The requirements also apply to third-party vendors providing ICT services to financial institutions, including cloud platforms or data analytics.
Financial entities and their vendors are required to define, document, and maintain a comprehensive digital operational resilience testing program that includes
vulnerability scanning and
penetration tests, plus Red-Teaming and Threat-Led Penetration Testing (TLPT).
The Red Team
With Edgescan, your internal security team can partner with a specialized group of security professionals who hold a range of certifications, including OSCE3, OSCP, Certified Azure Red Team Professional, GPEN, GIAC Red Team Professional (GRTP), CCSAM, CCSAS, and CCRTS.
These experts are trained in adversarial Tactics, Techniques, and Procedures (TTP) to identify and exploit vulnerabilities, alerting Edgescan clients to potential vulnerabilities in their systems by simulating real-world cyber attacks.
An Edgescan Red Team might use social engineering, such as phishing with reverse-shell payloads, to test your employees’ security awareness. Or they could use wireless assessments, such as “evil twin” schemes, to steal credentials. Or, with Threat-Led Penetration Testing (TLTP), they’ll attempt to gain access, move laterally, escalate their privileges, and simulate the havoc that a similar attack would wreak on your organization in the real world.
The Edgescan Difference
Edgescan’s Red Teams will engage your security systems over an extended timespan, looking at all available means to breach and exploit.
They’ll go well beyond the commercial, open-source, and proprietary scanning tools that form the basis of many vulnerability assessments, enlisting a varied arsenal of assessments to test the mettle of your security team and the posture they’ve built to safeguard your customers’ data and sensitive information.
Your staff won’t be aware of when and where a simulated attack will take place, adding an extra layer of realism. All your systems will be tested together, and the focus area will be fluid, dynamic, and wide-ranging.
This comprehensive approach will also satisfy Threat Intelligence-based Ethical Red Teaming (TIBER-EU) requirements, which align with DORA. Using threat intelligence to tailor testing, Edgescan’s ethical Red Teams can gauge the specific risk profile of your organization and mimic adversarial tactics to put your systems to the test.D