{"id":44549,"date":"2024-07-03T02:06:18","date_gmt":"2024-07-03T09:06:18","guid":{"rendered":"https:\/\/www.syteca.com\/?p=44549"},"modified":"2024-09-19T00:25:49","modified_gmt":"2024-09-19T07:25:49","slug":"digital-operational-resilience-act-compliance","status":"publish","type":"post","link":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance","title":{"rendered":"The 5 Fundamental Pillars of the Digital Operational Resilience Act (DORA)"},"content":{"rendered":"\n<p>Nowadays, financial organizations rely heavily on information and communication technology (ICT) to support remote operations. While ICT enhances operational efficiency and customer experience, it significantly increases cybersecurity risks in the <a href=\"\/en\/industries\/finance\" target=\"_blank\" rel=\"noreferrer noopener\">financial sector<\/a>.<\/p>\n\n\n\n<p>To mitigate cybersecurity risks related to ICT, the European Union (EU) has developed a specific regulation: the Digital Operational Resilience Act. In this article, we&#8217;ll review its five fundamental principles and how they can help your financial institution strengthen its IT security.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">What is DORA and its purpose?<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.digital-operational-resilience-act.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Operational Resilience Act (DORA)<\/a> is an EU regulation that came into force in January 2023. DORA establishes requirements for financial organizations to fortify resilience against ICT-related incidents.<\/p>\n\n\n\n<p>It aims to improve digital operational resilience in the financial sector across all member states of the EU. Operational resilience is the ability of a business to endure, react to, and recover from <a href=\"\/en\/blog\/top-10-cyber-security-breaches\" target=\"_blank\" rel=\"noreferrer noopener\">ICT-related incidents<\/a> and, thus, maintain critical operations even during disruptions.<\/p>\n\n\n\n<p>A range of financial entities operating in the EU are obliged to meet the DORA compliance requirements to maintain a sufficient level of digital operational resilience.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Benefits of DORA Compliance<\/h2>\n\n\n\n<p><a href=\"\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Complying with DORA<\/a> will bring financial organizations tangible benefits. Here are some of them:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"479\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03003823\/1-five-pillars-of-dora.svg\" alt=\"Benefits of the DORA EU regulation\" class=\"wp-image-44550\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strengthened corporate security<\/strong> \u2014 DORA requires financial institutions to implement a comprehensive cybersecurity framework that enhances their overall security.<\/li>\n\n\n\n<li><strong>Elevated protection of sensitive data <\/strong>\u2014 Adopting robust cybersecurity protocols and measures to comply with DORA can create a more secure environment for sensitive financial data.<\/li>\n\n\n\n<li><strong>Reduced cybersecurity risks<\/strong> \u2014 Implementing a comprehensive cybersecurity framework and the data protection measures required by the act minimizes the chance and impact of cyber attacks.<\/li>\n\n\n\n<li><strong>Boosted resilience against threats <\/strong>\u2014 Proactive risk management and comprehensive incident response planning enhance financial entities\u2019 resilience against threats. Businesses that meet the requirements of DORA are able to react to security incidents promptly and recover from them swiftly.<\/li>\n\n\n\n<li><strong>Streamlined experience exchange between peers<\/strong> \u2014 Thanks to the knowledge exchange, you can learn about current attack techniques and prevent them before they strike your organization.<\/li>\n\n\n\n<li><strong>Minimized third-party risks<\/strong> \u2014 Introducing the processes and measures required by DORA can strengthen financial organizations\u2019 relations with third parties and protect them against vendor-related security breaches.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca<\/a> is a comprehensive insider risk management software solution that streamlines your compliance efforts and brings even more security benefits to your financial institution.<\/p>\n\n\n\n<p>Read further to learn about the current status of DORA, deadlines for compliance, and potential penalties for those failing to comply.<\/p>\n\n\n\n\t\t<div  class=\"block-5f723a19-347f-4a20-9c16-90c5e540a208 areoi-element pattern-request-demo-1 rounded-bg-13px d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-2 lh-sm pt-2 has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Request access to the online demo of Syteca!<\/p>\n\n\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#1a3b4e;font-style:normal;font-weight:500\">See how Syteca can help you boost your operational resilience.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-9170fdac-8fec-4c73-a86c-338093dbf9d9 btn areoi-has-url position-relative mb-2 hsBtn-demo btn-info mt-4 btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">Current status of DORA<\/h2>\n\n\n\n<p>DORA was first proposed in 2020 and came into force in January 2023. At the moment, it is in the final stage of development; the three European Supervisory Authorities (ESAs) are fine-tuning the key details of the act. The first batch of policy products providing specific instructions on how financial entities need to comply with DORA is ready, while the second is expected by <strong>17 July 2024.<\/strong><\/p>\n\n\n\n<p>Ultimately, financial entities in the EU covered by DORA must comply with its requirements until <strong>17 January 2025<\/strong>. Also in 2025, the ESAs will begin overseeing the implementation of DORA\u2019s requirements by financial entities and ICT third-party providers.<\/p>\n\n\n\n<p>To ensure that financial institutions follow the DORA compliance requirements and maintain a sufficient level of digital operations resilience, the act implements a strict system of penalties for non-compliance. Thus, in 2025, the ESAs will be able to impose penalties on financial institutions that fail to comply with DORA. They can also penalize individuals who hold specific leadership or management roles with direct responsibility for DORA compliance. The size of penalties will depend on the level of violation.<\/p>\n\n\n\n<p>Financial entities may face penalties of up to <strong>2% of their total annual worldwide turnover<\/strong> or penalties of <strong>1% of the average daily global turnover in the previous year,<\/strong> paid daily for up to half a year until they comply. Individuals can face a maximum penalty of <strong>\u20ac1,000,000<\/strong>.<\/p>\n\n\n\n<p>Third-party ICT service providers labeled &#8220;critical&#8221; by the ESAs can face penalties of up to <strong>\u20ac5,000,000<\/strong> for organizations or a maximum of <strong>\u20ac500,000<\/strong> for individuals.<\/p>\n\n\n\n<p>The ESAs can also issue cease-and-desist orders, termination notices, or public announcements and impose additional financial penalties or, in some cases, criminal liabilities.<\/p>\n\n\n\n<p>From this DORA regulation summary, it\u2019s clear that there are both benefits for complying with DORA and potential negative consequences for non-compliance. Let\u2019s now look at the five key aspects behind the Digital Operational Resilience Act in greater detail.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"\/en\/resources\/white-papers\/achieving-and-sustaining-dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"338\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03004615\/2-five-pillars-of-dora-1024x338.png\" alt=\"\" class=\"wp-image-44557\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03004615\/2-five-pillars-of-dora-1024x338.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03004615\/2-five-pillars-of-dora-300x99.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03004615\/2-five-pillars-of-dora-768x254.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03004615\/2-five-pillars-of-dora-1536x507.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03004615\/2-five-pillars-of-dora.png 1650w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2  class=\"wp-block-heading\">The 5 key pillars of DORA requirements<\/h2>\n\n\n\n<p>The DORA regulation provides numerous requirements your financial organization should follow to build and maintain robust digital operation resilience.<\/p>\n\n\n\n<p>These requirements are fundamentally centered around five core domains.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"311\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03005155\/3-five-pillars-of-dora.svg\" alt=\"DORA regulation summary: Five key pillars of the act\" class=\"wp-image-44564\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">1. ICT risk management<\/h3>\n\n\n\n<p>According to DORA security requirements, you must establish a proactive ICT risk management process. It requires you to create and follow a comprehensive ICT risk management framework.<\/p>\n\n\n\n<p>Before establishing a framework, outline your financial entity\u2019s ICT-related security risks. Identify and classify your assets and functions from least to most critical, along with documentation of connections and dependencies between them. The act also obligates you to analyze how specific scenarios and disruptions may influence your operations and what the potential consequences may be.<\/p>\n\n\n\n<p>It also requires you to implement <a href=\"\/en\/blog\/information-security-policies\" target=\"_blank\" rel=\"noreferrer noopener\">information security policies<\/a> that can help mitigate ICT-related risks, including <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a>, <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access management<\/a>, and <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">incident detection and response<\/a>. As well, your financial institution should deploy cybersecurity tools to enforce those policies.<\/p>\n\n\n\n<p>Set roles and responsibilities for all ICT-related processes and ensure effective and timely communication and coordination between them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. ICT-related incident management<\/h3>\n\n\n\n<p>DORA cybersecurity requirements regulate how your financial institution should manage ICT-related incidents. It states that having the means and procedures to detect, analyze, classify, and report incidents is essential.<\/p>\n\n\n\n<p>You need to be able to document early signs of an incident to enable its swift detection. Decide on who is responsible for what when handling ICT-related incidents.<\/p>\n\n\n\n<p>Your financial entity should also establish incident response procedures to reduce the impact of incidents and maintain critical operations throughout them.<\/p>\n\n\n\n<p>In addition, the DORA regulation introduces requirements for incident reporting. Responsible personnel in your organization should not only report major incidents to internal management, but also to the relevant EU authorities, partners, and affected customers. Therefore, you need a straightforward incident communication plan.<\/p>\n\n\n\n\t\t<div  class=\"block-feb2a63d-5b57-4781-91e9-45f6d46777ff areoi-element pattern-start-trial-1 rounded-bg-13px d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-2 lh-base p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Explore the power of Syteca!<\/p>\n\n\n\n<p>Test how Syteca can help you secure user access to critical systems and data.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-trial\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-a078d8dd-5154-4728-856b-ae04c188c41a btn areoi-has-url position-relative mb-2 hsBtn-trial mt-1 btn-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tRequest a Free Trial \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h3 class=\"wp-block-heading\">3. Digital operational resilience testing<\/h3>\n\n\n\n<p>Another focus area is ICT systems testing, which aims to ensure your organization\u2019s resilience to attacks. Resilience testing helps you identify weaknesses and gaps in the ICT-related risk management process and then take on-target corrective measures.<\/p>\n\n\n\n<p>To identify your organization&#8217;s level of operational resilience, you need to conduct a series of vulnerability and penetration tests, as well as incident response drills. These tests should be conducted by independent parties from within or outside your organization at least once a year.<\/p>\n\n\n\n<p>When the testing is complete, classify and prioritize the issues identified during the testing process and determine how to fix them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. ICT third-party risk management<\/h3>\n\n\n\n<p>Third-party risk is a major theme throughout the Digital Operational Resilience Act. Since financial organizations nowadays greatly depend on third-party ICT service providers, securing cooperation with third parties is essential.<\/p>\n\n\n\n<p>Even if you use third-party services to support your business operations, you remain responsible for your organization\u2019s digital operational resilience and compliance with DORA requirements at all times. That\u2019s why you need to build a third-party risk management strategy.<\/p>\n\n\n\n<p>According to DORA, you must thoroughly assess the cybersecurity measures taken by potential service providers before signing an agreement with them. Your organization is also required to complement contractual agreements with clauses mandating third parties to implement adequate cybersecurity measures and comply with DORA standards.<\/p>\n\n\n\n<p>Additionally, you need to establish <a href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">third-party vendor monitoring<\/a> procedures to check if third parties actually follow cybersecurity best practices and meet compliance.<\/p>\n\n\n\n<p class=\"p-read-also\"><a class=\"read-also\" href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noopener\">Third-Party Vendor Monitoring with Syteca<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Information and intelligence sharing<\/h3>\n\n\n\n<p>DORA highlights the importance of collaboration within the EU financial sector. It encourages the creation of an environment where covered financial entities can share incident intelligence and strategies to stay ahead of cyber threats.<\/p>\n\n\n\n<p>Such an environment can help the financial industry in the EU raise awareness about ICT-related risks and limit the spread of ICT threats. However, organizations should only share information through secure means and ensure that sensitive data is appropriately protected.<\/p>\n\n\n\n<p>Still, sharing information and intelligence with other financial entities is rather a recommendation than a mandatory requirement and is completely voluntary.<\/p>\n\n\n\n<p>Now that we\u2019ve learned about the key pillars of DORA, let\u2019s find out how you can uphold them with the help of Syteca.<\/p>\n\n\n\n<p class=\"p-read-also\"><a class=\"read-also\" href=\"\/en\/solutions\/meeting-compliance-requirements\" target=\"_blank\" rel=\"noopener\">Meeting IT Compliance Requirements with Syteca<\/a><\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How Syteca can help you comply with DORA<\/h2>\n\n\n\n<p>Syteca is <a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">a full-cycle insider risk management platform<\/a> that helps organizations deter, detect, and disrupt security threats within their networks. Its variety of cybersecurity features can help you enhance operational resilience and implement DORA\u2019s five key pillars in your financial organization.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For effective <strong>ICT risk management<\/strong>, Syteca provides full visibility into the activity in your network. It <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">continuously monitors and records all user activity<\/a> and can notify your security personnel whenever something seems suspicious. High-risk user sessions are marked with corresponding alert icons, so it doesn\u2019t take long to find a session that triggered an alert, view it, and disrupt it if needed.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013125\/4-five-pillars-of-dora-1024x521.png\" alt=\"Viewing the monitoring results in Syteca\" class=\"wp-image-44571\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013125\/4-five-pillars-of-dora-1024x521.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013125\/4-five-pillars-of-dora-300x153.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013125\/4-five-pillars-of-dora-768x391.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013125\/4-five-pillars-of-dora-1536x782.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013125\/4-five-pillars-of-dora.png 1650w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For <strong>ICT-related incident management<\/strong>, Syteca offers <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">a rule-based incident detection and response functionality<\/a>. It provides a set of predefined rules that you can use to configure incident detection and response processes. You can also create custom rules to tailor the processes to your specific needs. Additionally, Syteca can empower you with auditing and reporting tools to simplify incident reporting to the board and EU authorities.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"523\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013200\/5-five-pillars-of-dora-1024x523.png\" alt=\"Adding an alert in Syteca\" class=\"wp-image-44578\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013200\/5-five-pillars-of-dora-1024x523.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013200\/5-five-pillars-of-dora-300x153.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013200\/5-five-pillars-of-dora-768x392.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013200\/5-five-pillars-of-dora-1536x784.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013200\/5-five-pillars-of-dora.png 1650w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When conducting<strong> digital operational resilience testing<\/strong>, Syteca\u2019s online session viewing allows you to track the progress in real time and observe how users react to various test cases.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"487\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013632\/6-five-pillars-of-dora-1024x487.png\" alt=\"Syteca's session viewing\" class=\"wp-image-44585\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013632\/6-five-pillars-of-dora-1024x487.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013632\/6-five-pillars-of-dora-300x143.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013632\/6-five-pillars-of-dora-768x365.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013632\/6-five-pillars-of-dora-1536x730.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03013632\/6-five-pillars-of-dora.png 1650w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To streamline<strong> third-party risk management<\/strong>, Syteca enables you to granularly manage your service providers\u2019 <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access permissions<\/a> and secure their <a href=\"\/en\/product\/supported-platforms\/windows-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">remote connections<\/a> to your network. As well, with Syteca\u2019s continuous monitoring functionality, you can watch your service providers\u2019 activity.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015015\/7-five-pillars-of-dora-1024x521.png\" alt=\"Adding a secret in Syteca\" class=\"wp-image-44592\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015015\/7-five-pillars-of-dora-1024x521.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015015\/7-five-pillars-of-dora-300x153.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015015\/7-five-pillars-of-dora-768x391.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015015\/7-five-pillars-of-dora-1536x782.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015015\/7-five-pillars-of-dora.png 1650w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To empower you to <strong>share intelligence<\/strong> on security incidents with peers, Syteca offers an evidence exporting function. With it, you can export and share user sessions and activity reports. The <a href=\"\/en\/user-privacy\" target=\"_blank\" rel=\"noreferrer noopener\">user data anonymization<\/a> feature will help you respect individuals\u2019 right to privacy and keep personal user data safe.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"496\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015056\/8-five-pillars-of-dora-1024x496.png\" alt=\"Syteca's session export\" class=\"wp-image-44599\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015056\/8-five-pillars-of-dora-1024x496.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015056\/8-five-pillars-of-dora-300x145.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015056\/8-five-pillars-of-dora-768x372.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015056\/8-five-pillars-of-dora-1536x745.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015056\/8-five-pillars-of-dora.png 1650w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This is only a brief overview of Syteca\u2019s capabilities. <a href=\"\/en\/resources\/white-papers\/achieving-and-sustaining-dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Download our white paper<\/a> to discover a detailed summary of how Syteca can help you implement and maintain the five key pillars of DORA.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Financial organizations need to shift from reactive to proactive management of cybersecurity risks. And since they only have until January 2025 to implement the DORA requirements, it&#8217;s crucial for CIOs, CSOs, and CCOs of financial entities operating in the EU to prioritize compliance efforts without delay.<\/p>\n\n\n\n<p>Syteca is a comprehensive platform that comprises various robust cybersecurity functionalities, such as <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a>, <a href=\"\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a>, <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access management<\/a>, <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">user activity monitoring<\/a>, <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">incident detection and response<\/a>, and <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">auditing and reporting<\/a>. These capabilities can enhance your organization\u2019s operational resilience and ensure compliance.<\/p>\n\n\n\n\t\t<div  class=\"block-a5a922ff-56ce-4468-9941-ea5073690a8c areoi-element container pattern-request-demo-2 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 235,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-956ebe2e-368e-4ac7-8ee2-a15583083abd row areoi-element align-items-center row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e962fe6-f77f-40f9-898c-abaef3f48ccb col areoi-element d-flex flex-wrap flex-column align-items-center align-items-md-start col-md-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left p-poppins pt-3 text-center text-md-start lh-sm has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Want to try Syteca? Request access<br>to the online demo!<\/p>\n\n\n\n<p class=\"has-text-align-left p-poppins pb-3 text-center text-md-start\" style=\"font-style:normal;font-weight:500\">See why clients from 70+ countries already use Syteca.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-9170fdac-8fec-4c73-a86c-338093dbf9d9 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f840f051-f300-4ade-9e70-68d6c65e619d col areoi-element col-md-6 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"369\" height=\"248\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png\" alt=\"\" class=\"wp-image-24868\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png 369w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584-300x202.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"<p>Nowadays, financial organizations rely heavily on information and communication technology (ICT) to support remote operations. While ICT enhances operational efficiency and customer experience, it significantly increases cybersecurity risks in the financial sector. To mitigate cybersecurity risks related to ICT, the European Union (EU) has developed a specific regulation: the Digital Operational Resilience Act. In this [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":44606,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[],"class_list":["post-44549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-compliance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Operational Resilience Act (DORA) Compliance Guide | Syteca<\/title>\n<meta name=\"description\" content=\"Discover the fundamental principles of the Digital Operational Resilience Act (DORA) and five key aspects you need for compliance with the regulation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Operational Resilience Act (DORA) Compliance Guide | Syteca\" \/>\n<meta property=\"og:description\" content=\"Discover the fundamental principles of the Digital Operational Resilience Act (DORA) and five key aspects you need for compliance with the regulation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-03T09:06:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T07:25:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015749\/OG-five-pillars-of-dora.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Yana Storchak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015752\/OG-TW-five-pillars-of-dora.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yana Storchak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\"},\"author\":{\"name\":\"Yana Storchak\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a5d53fcbde60892b7a2bf839215d7c2a\"},\"headline\":\"The 5 Fundamental Pillars of the Digital Operational Resilience Act (DORA)\",\"datePublished\":\"2024-07-03T09:06:18+00:00\",\"dateModified\":\"2024-09-19T07:25:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\"},\"wordCount\":1875,\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png\",\"articleSection\":[\"Industry Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\",\"url\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\",\"name\":\"Digital Operational Resilience Act (DORA) Compliance Guide | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png\",\"datePublished\":\"2024-07-03T09:06:18+00:00\",\"dateModified\":\"2024-09-19T07:25:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a5d53fcbde60892b7a2bf839215d7c2a\"},\"description\":\"Discover the fundamental principles of the Digital Operational Resilience Act (DORA) and five key aspects you need for compliance with the regulation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png\",\"width\":1920,\"height\":601},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Industry Compliance\",\"item\":\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 5 Fundamental Pillars of the Digital Operational Resilience Act (DORA)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a5d53fcbde60892b7a2bf839215d7c2a\",\"name\":\"Yana Storchak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111334\/Yana.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111334\/Yana.png\",\"caption\":\"Yana Storchak\"},\"description\":\"Yana is a proficient technical writer specializing in the dynamic realms of information security and data protection. With a keen eye for detail and a deep understanding of cybersecurity principles, Yana crafts articulate, engaging content that demystifies complex concepts for a wide audience. Her commitment to staying abreast of evolving threats and emerging technologies ensures that her work not only informs but empowers individuals and organizations to safeguard their digital assets effectively.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/yana-storchak\/\"],\"url\":\"https:\/\/www.syteca.com\/en\/blog\/author\/yana-storchak\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Operational Resilience Act (DORA) Compliance Guide | Syteca","description":"Discover the fundamental principles of the Digital Operational Resilience Act (DORA) and five key aspects you need for compliance with the regulation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance","og_locale":"en_US","og_type":"article","og_title":"Digital Operational Resilience Act (DORA) Compliance Guide | Syteca","og_description":"Discover the fundamental principles of the Digital Operational Resilience Act (DORA) and five key aspects you need for compliance with the regulation.","og_url":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance","og_site_name":"Syteca","article_published_time":"2024-07-03T09:06:18+00:00","article_modified_time":"2024-09-19T07:25:49+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015749\/OG-five-pillars-of-dora.png","type":"image\/png"}],"author":"Yana Storchak","twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015752\/OG-TW-five-pillars-of-dora.png","twitter_misc":{"Written by":"Yana Storchak","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#article","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance"},"author":{"name":"Yana Storchak","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a5d53fcbde60892b7a2bf839215d7c2a"},"headline":"The 5 Fundamental Pillars of the Digital Operational Resilience Act (DORA)","datePublished":"2024-07-03T09:06:18+00:00","dateModified":"2024-09-19T07:25:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance"},"wordCount":1875,"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png","articleSection":["Industry Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance","url":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance","name":"Digital Operational Resilience Act (DORA) Compliance Guide | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png","datePublished":"2024-07-03T09:06:18+00:00","dateModified":"2024-09-19T07:25:49+00:00","author":{"@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a5d53fcbde60892b7a2bf839215d7c2a"},"description":"Discover the fundamental principles of the Digital Operational Resilience Act (DORA) and five key aspects you need for compliance with the regulation.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png","width":1920,"height":601},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Industry Compliance","item":"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance"},{"@type":"ListItem","position":2,"name":"The 5 Fundamental Pillars of the Digital Operational Resilience Act (DORA)"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a5d53fcbde60892b7a2bf839215d7c2a","name":"Yana Storchak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111334\/Yana.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111334\/Yana.png","caption":"Yana Storchak"},"description":"Yana is a proficient technical writer specializing in the dynamic realms of information security and data protection. With a keen eye for detail and a deep understanding of cybersecurity principles, Yana crafts articulate, engaging content that demystifies complex concepts for a wide audience. Her commitment to staying abreast of evolving threats and emerging technologies ensures that her work not only informs but empowers individuals and organizations to safeguard their digital assets effectively.","sameAs":["https:\/\/www.linkedin.com\/in\/yana-storchak\/"],"url":"https:\/\/www.syteca.com\/en\/blog\/author\/yana-storchak"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/44549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=44549"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/44549\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/44606"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=44549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/categories?post=44549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/tags?post=44549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}