homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured: Solutions for Emerging Risks

    Discover tailored resources that translate emerging threats into actionable strategies

    Risk-Based Solutions

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Navigating DORA and NIS2 Compliance for Financial Sector Organisations in the EU
Jurgita Skritaite
Jurgita Skritaite

Navigating DORA and NIS2 Compliance for Financial Sector Organisations in the EU

Practical insights on both DORA and NIS2 regulations. If you haven't started implementing measures yet, you're already late.

May 27, 2025

The probability of an organisation being affected by a cyber incident grows annually. The damage caused is not only financial, but also impacts operational continuity and trust in digital services. With the introduction of European regulations DORA and NIS2, the pressure on organisations to take measures is only increasing.

Organisations operating within the EU face two important legal frameworks designed to enhance digital resilience: the Digital Operational Resilience Act (DORA) and the Network and Information Security 2 (NIS2) Directive. Both frameworks have similar objectives but differ in scope and specific requirements. For many organisations, however, it remains unclear which regulations apply to them and what exactly is expected of them.

During a recent SANS webcast, Jurgita Skritaite, Senior Cybersecurity Policy Expert at the European Union Agency for Network and Information Security (ENISA), shared practical insights on both regulations. Her message was clear: "If you haven't started implementing measures yet, you're already late."

The Fundamental Differences Between DORA and NIS2

DORA and NIS2 differ fundamentally in their legal character. NIS2 is a directive that each EU country must transpose into national legislation, whilst DORA is a regulation that directly applies to all EU member states. "DORA shares similar objectives with NIS2 but focuses specifically on the financial sector," Skritaite clarifies. "While NIS2 provides a broad horizontal framework, DORA builds upon it with tailored requirements to address unique risks and dependencies within the financial sector."

DORA takes precedence as sector-specific legislation for organisations falling under both regulations, such as certain financial institutions. If you are a bank or defined as a credit institution, or if you operate a financial market infrastructure such as a trading venue or central counterparty, then NIS2 does not apply, only DORA.

However, the story is more complex for ICT service providers. Some may fall under both frameworks and face conflicting communication obligations. This dual regime presents unique challenges, particularly regarding incident reporting and supervision.

Who Falls Under DORA and NIS2?

DORA specifically targets the financial sector and encompasses approximately 20 different types of financial entities, including banks, insurers, payment institutions, electronic money institutions, and crypto-asset service providers. Additionally, ICT service providers upon which the financial sector relies, such as data centres and cloud providers, fall under this regulation.

NIS2 has a broader scope covering various critical sectors, including energy, health, and transport. During the webcast, SANS Director Brian Correia emphasised that these regulations ultimately aim to protect citizens and crucial infrastructure.

Under NIS2, organisations are classified based on both sector and size:

  • 'Essential entities': Large organisations (250+ employees or €50M+ turnover) in critical sectors
  • 'Important entities': Medium-sized organisations (50+ employees or €10M+ turnover) in critical sectors, or medium/large organisations in supportive sectors like digital providers or food

Unlike DORA, which applies regardless of company size, NIS2 uses these size thresholds to determine applicability. However, Skritaite notes that "member states may also include smaller entities if they provide critical services."

An organisation is considered 'large' based on the following criteria:

  • A minimum of 250 employees, or
  • Annual turnover of €50 million or more and a balance sheet total of €43 million or more.

An organisation is considered 'medium-sized' based on:

  • 50 or more employees, or
  • Annual turnover and balance sheet total of €10 million or more.

Territorial Scope: When Are You Required to Comply?

A frequently asked question is whether organisations outside the EU must also comply with DORA and NIS2. The answer is yes, if they provide services to EU entities or operate within the EU.

"Both frameworks, DORA and NIS2, apply to the entire European Union and impact all member states," says Skritaite. For most organisations, jurisdiction is determined by the member state where the organisation is established and where it provides services. For ICT service providers, however, specific rules apply. "Under the NIS2 directive, telecom providers, for example, are regulated based on where services are delivered. It doesn't matter where you are established, but if you deliver services in another country, you fall under the jurisdiction of that country."

For cloud, data centre, and managed service providers, jurisdiction is determined by the member state where the main EU establishment is located. "The main EU establishment is defined as the place where key decisions regarding cybersecurity are made, where cybersecurity operations are carried out, or where the organisation employs the most people in the EU," Skritaite clarifies.

If a cloud or data centre service provider is not established in the EU but provides services within the EU, it must designate a representative within the EU in one of the member states where their services are offered.

The State of Cybersecurity in Europe: Not All Sectors Are Equally Resilient

ENISA has conducted extensive research into the cybersecurity maturity and criticality of various sectors covered by NIS2. The ultimate goal is to increase the level of cybersecurity across all sectors, including the financial services sector.

The research shows that the banking sector is one of the three most critical and mature sectors. This sector scores relatively high because it has long been under regulation. It is one that invests the most in cybersecurity and has a solid public-private partnership. Correia notes that this is not surprising: "In the financial sector, cybersecurity can determine whether you stay in business or not. If customers don't have confidence in the cybersecurity you provide, they have plenty of other options." This market pressure drives financial institutions towards higher maturity.

The Financial Market Infrastructure (FMI) sector scores slightly lower than the banking sector, particularly in the areas of collaboration, information sharing, and operational readiness. "Banks indicate that they feel sufficiently mature and have detection and response capabilities to manage advanced threats in most parts of their infrastructures. FMIs, on the other hand, report lower levels of these capabilities and are primarily able to detect simpler attacks," says Skritaite.

More worryingly, some sectors on which the financial sector depends, such as ICT service providers, fall within the ‘risk zone’. This means that their criticality exceeds their maturity. "The financial sector depends on ICT service providers, including ICT service management. And the ICT service management sector falls within the risk zone due to its cross-border complexity, highlighting the need for targeted improvements."

Incident Reporting: A Complex Process with Strict Deadlines

One key aspect of both DORA and NIS2 is the obligation to report cybersecurity incidents. While both frameworks follow a similar three-step approach, organisations should be aware of important differences.

"First, there is the definition of reportable incidents," Skritaite explains. "Under DORA, the definition of a 'major ICT-related incident' focuses on the technical and operational impact on the critical or important functions within the financial sector. Under NIS2, the definition of a 'significant incident' is somewhat broader."

The reporting timelines also differ. Skritaite: "With DORA, the deadline for the interim report of 72 hours is calculated from the time the initial report is submitted. You have 24 hours to submit the initial report and then 72 hours for the interim report. With NIS2, the timeline starts from the moment the entity becomes aware of the incident, making the window for follow-up reporting shorter in practice."

The expert warns that this can be particularly challenging for ICT service providers covered by both regulations, as the reporting templates and required level of detail also differ between DORA and NIS2.

Practical Steps to Become Compliant

Given the complexity of the regulations and the strict deadlines, the question arises: what should organisations concretely do to become compliant? During the webcast, five essential steps were emphasised for preparing for a cyber incident:

  1. Develop an incident response plan that includes procedures, escalation paths, and key contacts.
  2. Identify the most critical assets and assess the risks associated with them to understand what requires the highest level of protection.
  3. Implement monitoring and detection systems to identify incidents as early as possible.
  4. Clearly assign roles and responsibilities, both internally and for external service providers.
  5. Conduct regular staff training and simulation exercises to build awareness and readiness.

"Having an incident response plan is important, but it's not enough. It must be tested in practice," Skritaite emphasises during the webcast. Correia adds that it should be clear beforehand who has which role during an incident, from the cybersecurity teams to the C-suite and the board of directors.

For organisations concerned about the costs of compliance, such as setting up a Security Operations Centre (SOC), Skritaite points to possible solutions: "It is not necessary for a public administration to have an individual SOC. Multiple public administrations can set up one SOC together and share resources."

Moreover, organisations can make use of existing international standards. Both NIS2 and DORA align with established international standards such as the ISO 27000 series, the NIST Cybersecurity Framework, or the CIS Critical Controls. This means that organisations already following these standards will find it easier to become compliant.

The Timeline for Compliance and the Threat of Fines

For many organisations, the question is not whether they need to comply with DORA and NIS2, but when. "If you haven't started yet, you're already late," warns Skritaite. "DORA and NIS2 are already applicable. The deadline for DORA compliance was 17 January 2025."

For NIS2, the situation is more complex, as not all member states have transposed the directive into national legislation. "If I'm not mistaken, nine member states already have, and some other member states are behind."

Regarding fines, the good news is that member states do not immediately plan to penalise entities that are not yet fully compliant. "In conversations with member states, I know they don't plan to penalise now. They will give time, and NIS2 is not about penalising entities. It's more about building trust and resilience and the willingness to do something to improve cybersecurity," says Skritaite.

The Human Factor: Addressing the Personnel Shortage

Cybersecurity is not just a technical issue but also a human one. One of the biggest challenges for organisations is finding and retaining qualified personnel.

ENISA has conducted an investment study and asked various sectors about their recruitment plans. On average, companies plan to hire two FTEs, and the banking sector plans four FTEs. However, they have difficulty recruiting people.

Interestingly, the number of ICT and cybersecurity personnel in relation to the total workforce in companies is slightly declining. There may be different reasons: it is difficult to recruit people, but automation also plays a role. Many companies are now implementing machine learning and AI for certain tasks that were previously performed by humans, especially within security operations.

SANS has also recently conducted a workforce study in which ENISA participated. Correia shared during the webcast that for the first time, the main problem was not seen as a shortage of personnel, but rather a lack of the right skills. Technical capabilities now top the list when hiring personnel, while work experience has dropped to fourth place.

What's even more interesting is that more than 50 per cent of European organisations indicated that regulations such as DORA and NIS2 influence their recruitment policy—a percentage that is expected to grow as these regulations become more established.

Risk Management as a Foundation

ENISA expert Skritaite emphasises the importance of a well-defined risk management framework supported by top management as the most important advice for organisations wanting to become compliant. This ensures that cybersecurity and compliance are aligned with the actual risks and priorities of organisations and that responsibilities are clearly assigned and monitored.

The risk management framework forms the basis for meeting the requirements of both horizontal tools, such as NIS2, and sector-specific ones, such as DORA. With the right approach, organisations can not only comply with the regulations but also improve their overall cybersecurity posture and contribute to a safer digital ecosystem in Europe.

Ultimately, compliance with DORA and NIS2 is not just about ticking boxes, but about strengthening digital resilience – and thereby trust. Organisations that know their risks and anticipate them are not only better protected but also better positioned to provide certainty to their customers, partners, and shareholders in an increasingly complex digital landscape.

Additional Resources

For more information about DORA and NIS2 and how your organisation can become compliant, you can consult the following resources:

  • DORA Resources
  • NIS2 Resources
  • ENISA website
Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cybersecurity Leadership

Related Content

Blog
Stay Ahead Ransomware Incident Communications 340x340
Cybersecurity Leadership
June 4, 2025
Stay Ahead of Ransomware: Communication During a Cyber Incident
Learn the critical role of communications during cyber incidents
Mari DeGrazia
Mari DeGrazia
read more
Blog
Thumbnail: Emerging Threats Summit 2025 340x340
Cybersecurity Leadership
June 2, 2025
2025 SANS Emerging Threats Summit Recap: Unpacking the Quantum Revolution (and How to Defend Against It)
Learn the seven key takeaways that security leaders should prioritize to prepare for the quantum era
SANS_social_88x82.jpg
SANS Institute
read more
Blog
Cybersecurity Leadership
May 30, 2025
SANS Cyber Leaders Podcast Season 2: Empowering CISOs to Navigate a Perfect Storm of Complexity
The SANS Institute’s Cyber Leaders Podcast is back with a second season.
SANS_social_88x82.jpg
SANS Institute
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn