Search

DORA / Red-Teaming

In the European Union, the Digital Operational Resilience Act (DORA) is the new standard for information security among financial institutions and introduces rules around incident management and reporting, digital testing, and management of third-party risk.

With the Edgescan Red Team service, a specialized group of certified security professionals will help bring your firm in compliance with DORA (and other aligning standards like TIBER-EU) by emulating adversarial tactics to identify, exploit, and report vulnerabilities in your systems.

Red Teaming is typically combined with the continuous testing and exposure management approach edgescan traditionally delivers to provide both deep threat-based assessments and validated full stack assessments on demand.


What is DORA?

From January 2025, the Digital Operational Resilience Act (DORA) governs information security for financial institutions that do business in the European Union, particularly those regulated by central banks. That includes commercial banks, insurance companies, investment firms, and more. DORA ensures that the E.U. financial sector can withstand, respond to, and recover from Information and Communications Technology (ICT)-related disruptions and cyberattacks. New rules around incident management and reporting, digital testing, and management of third-party risk are designed to guide financial firms in building robust security postures in the face of a threat matrix that’s constantly evolving. The requirements also apply to third-party vendors providing ICT services to financial institutions, including cloud platforms or data analytics. Financial entities and their vendors are required to define, document, and maintain a comprehensive digital operational resilience testing program that includes vulnerability scanning and penetration tests, plus Red-Teaming and Threat-Led Penetration Testing (TLPT).

The Red Team

With Edgescan, your internal security team can partner with a specialized group of security professionals who hold a range of certifications, including OSCE3, OSCP, Certified Azure Red Team Professional, GPEN, GIAC Red Team Professional (GRTP), CCSAM, CCSAS, and CCRTS. These experts are trained in adversarial Tactics, Techniques, and Procedures (TTP) to identify and exploit vulnerabilities, alerting Edgescan clients to potential vulnerabilities in their systems by simulating real-world cyber attacks. An Edgescan Red Team might use social engineering, such as phishing with reverse-shell payloads, to test your employees’ security awareness. Or they could use wireless assessments, such as “evil twin” schemes, to steal credentials. Or, with Threat-Led Penetration Testing (TLTP), they’ll attempt to gain access, move laterally, escalate their privileges, and simulate the havoc that a similar attack would wreak on your organization in the real world.

The Edgescan Difference

Edgescan’s Red Teams will engage your security systems over an extended timespan, looking at all available means to breach and exploit. They’ll go well beyond the commercial, open-source, and proprietary scanning tools that form the basis of many vulnerability assessments, enlisting a varied arsenal of assessments to test the mettle of your security team and the posture they’ve built to safeguard your customers’ data and sensitive information. Your staff won’t be aware of when and where a simulated attack will take place, adding an extra layer of realism. All your systems will be tested together, and the focus area will be fluid, dynamic, and wide-ranging. This comprehensive approach will also satisfy Threat Intelligence-based Ethical Red Teaming (TIBER-EU) requirements, which align with DORA. Using threat intelligence to tailor testing, Edgescan’s ethical Red Teams can gauge the specific risk profile of your organization and mimic adversarial tactics to put your systems to the test.D
Contact us for more information on how Edgescan can help secure your business.