Compliance

DORA Non-Compliance Could Cost Your Business

Sean Tilley 3 February 2025

DORA Non-Compliance Could Cost Your Business

Recent trends highlight an alarming increase in cybercrime. New EU legislation, now in effect, means that firms which don't shape up – such as those in the private banking space – could be hit by fines.

As reported recently, new European Union legislation has taken effect which covers areas such as cybersecurity and overall digital resilience. To discuss what’s at stake is Sean Tilley, who is senior director of sales for Europe, Middle East and Africa at 11:11 Systems. (The UK-based firm was recently profiled here. 11:11 has recovery processes in place that firms can use. Part of its offering is educating and training clients, and developing ideas on how organisations can act in particular situations.)

The editors are pleased to share these views; the usual editorial disclaimers operate; we urge readers who want to jump into the conversation to do so and email tom.burroughes@wealthbriefing.com and amanda.cheesley@clearviewpublishing.com.

Prompted by a new era of cyber attacks surging downtime and data breaches, the Digital Operational Resilience Act (DORA) regulation came into force on 17 January to reshape the way in which organisations approach security, privacy and cybersecurity. Cybercriminals are becoming increasingly daring and creative, with an expected rise in the exploitation of new vulnerabilities in 2025.

Recent trends highlight an alarming increase in cybercrime. Research by Security Scorecard revealed that 78 per cent of Europe’s largest financial institutions experienced third-party data breaches in the past year of which 84 per cent were exposed to fourth-party breaches, underscoring the extensive reach of cyber threats within the financial sector. 

Further, according to the World Economic Forum’s Global Cyber Security Outlook Report, supply chain vulnerabilities are emerging as the top ecosystem cyber risk with 54 per cent of large organisations identifying supply chain challenges as the biggest barrier to achieving cyber resilience.

As organisations adopt hybrid work models and shift towards cloud-based infrastructures, they inadvertently expose themselves to a greater volume of cyber attacks. These threats are increasingly sophisticated, often employing AI technologies to automate attack vectors. In this context, DORA is not merely a legal obligation but a crucial strategy for organisations to reinforce their cybersecurity frameworks and achieve operational resilience.

Ransomware dominates as the top threat across 92 per cent of industries, according to the 2024 Verizon Data Breach Investigations Report, making rapid patching and exposure management more critical than ever for organisations striving to stay ahead. DORA’s regulatory framework is designed to improve the integrity and resilience of digital systems in financial entities and information and communication technology (ICT) third-party service providers across Europe, harmonising how organisations detect, handle and report ICT-related risks to mitigate the ever-growing risk of breaches.

Understanding the consequences of non-compliance
As businesses increasingly face a rising tide of cyber threats, DORA has emerged as a pivotal framework designed to enhance the cybersecurity posture of financial institutions within the European Union.

Although, many large financial firms, which already operate within a highly regulated sector, typically have robust cyber resiliency integrated into their systems, compliance concerns continue to weigh heavily on the UK financial services sector. 

A report by Orange Cyberdefense revealed that 43 per cent organisations were expected to miss the DORA compliance deadline. Even more striking, delays are projected to last for at least three months due to the complexity of regulatory requirements.

As DORA is already here, bringing strict mandates to areas such as ICT risk management, incident reporting, testing, threat information sharing, and third-party risk management cannot be overlooked without facing substantial fines. Organisations must notify the relevant competent authority of “major” incidents (relating to the impact of critical services) within just four hours of determining that the incident meets this classification. Following the initial notification, a detailed intermediate report must be submitted within 72 hours of classifying the incident as major. DORA additionally requires firms to collate information about their contracts with IT providers into a register.

Failure to comply with these regulations can have severe repercussions. The act requires EU member states to implement appropriate penalties for breaches, which may include fines of at least 2 per cent of the average daily worldwide turnover for up to six months or individual fines reaching up to €1 million ($1.03 million). Critical third-party ICT service providers that fail to adhere to DORA's requirements risk facing even steeper fines, operational restrictions, and irreparable reputational damage.

Regulatory authorities possess the power to limit or suspend the business activities of non-compliant financial firms until full compliance is achieved. The competent authority also has the right to request data traffic records from telecommunications operators if there is reasonable suspicion of a breach. Public notices identifying those involved and the nature of the breach may be issued additionally. Such penalties might have a more significant financial impact than fines alone. Notably, DORA introduces individual liability for business leaders regarding their firm’s compliance failures, with a maximum penalty of €1 million.

A call for robust compliance strategies
A recent data reporting dry run conducted by the European Supervisory Authorities (ESAs) involving 1,039 financial firms revealed that only 6.5 per cent reported no data reporting failures. The majority of reporting errors were attributed to gaps in reporting accuracy with 84 per cent of reporting failures stemmed from missing data in mandatory fields, with a further 6.5 per cent due to faulty Legal Entity Identifiers (LEI) also contributing to compliance challenges.

Therefore, companies and firms must provide the correct information to avoid reporting failures and data quality issues. It is also essential that organisations obtain an LEI to enable them to participate in data reporting.

Organisations that do not adopt proactive and comprehensive cybersecurity strategies and fail to comply with DORA face a spectrum of significant consequences that could jeopardise not only their operations but also their reputation and client trust.

Moving forward
The DORA framework offers a structured approach for financial entities and its third-party providers to manage operational resilience in an increasingly digital landscape. Collaborating with specialised compliance partners can help organisations manage the complexities of these regulations, ensuring that adherence translates into genuine operational strength.

Considering the evolving threat landscape and the severe consequences of non-compliance, organisations must prioritise compliance with DORA while reinforcing their cybersecurity frameworks. The stakes are high, but the right measures can lead to a more resilient and secure operational environment for all stakeholders involved.

Register for WealthBriefing today

Gain access to regular and exclusive research on the global wealth management sector along with the opportunity to attend industry events such as exclusive invites to Breakfast Briefings and Summits in the major wealth management centres and industry leading awards programmes