
Martin Hořický
The goal of information security is to protect an organization's information and assets from loss, leakage, unauthorized access, theft, natural disasters, or other threats so that the information and assets remain useful only to their users.
At BDO, we offer both information and cyber security services. As part of information security, we can help you secure your information and assets to minimize potential threats. We comply with legislative requirements, in particular ISO standards and the Cybersecurity Act (ZKB).
We will help you build information security in your organization from the ground up, starting with complete preparation and ending with final implementation. If you already have some parts implemented we will perform a complete audit in individual areas e.g. ISMS or compliance with the ZKB. At the same time, we also provide consulting services in sub-parts, such as the design of risk management methodologies, the establishment of security policies or the creation of security documentation.
The goal of information security is to protect an organization's information and assets from loss, leakage, unauthorized access, theft, natural disasters, or other threats so that the information and assets remain useful only to their users.
At BDO, we offer both information and cyber security services. As part of information security, we can help you secure your information and assets to minimize potential threats. We comply with legislative requirements, in particular ISO standards and the Cybersecurity Act (ZKB).
We will help you build information security in your organization from the ground up, starting with complete preparation and ending with final implementation. If you already have some parts implemented we will perform a complete audit in individual areas e.g. ISMS or compliance with the ZKB. At the same time, we also provide consulting services in sub-parts, such as the design of risk management methodologies, the establishment of security policies or the creation of security documentation.
To ensure consistency across the financial system, the Regulation will apply to a number of EU regulated financial institutions, including credit institutions, payment institutions, securities dealers, insurance companies including intermediaries, etc. It will also apply to third party ICT service providers. Under the proposal, this category will include in particular cloud service providers, software, data centres and others. For example, some operators of payment systems with irrevocable settlement will not be included under DORA.
The Regulation applies to a number of financial institutions regulated by the EU, including credit institutions, payment institutions, securities dealers, insurance companies, etc. It will also apply to ICT service providers. This category includes, for example, suppliers of cloud services, software, data centres. On the other hand, certain operators of payment and credit card systems are exempted. In particular, micro-enterprises (up to 10 persons, with an annual turnover of less than EUR 2 million) are granted significant relief from some obligations. For example, they are not obliged to establish, maintain and review a so-called comprehensive digital operational resilience testing programme.
If your organization follows the Dora Directive, we can provide audit work and verify the correct setup of the Dora requirements. If you would like to bring your organization into Dora compliance, we can help you with the complete A to Z implementation process.