{"id":7899,"date":"2026-03-15T04:44:57","date_gmt":"2026-03-15T04:44:57","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/04\/02\/post_id-5311\/"},"modified":"2026-04-10T08:20:41","modified_gmt":"2026-04-10T08:20:41","slug":"dora-and-nis2-simultaneously-how-financial-service-providers-manage-the-compliance-double-pressure","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2026\/03\/15\/dora-and-nis2-simultaneously-how-financial-service-providers-manage-the-compliance-double-pressure\/","title":{"rendered":"DORA and NIS2 Simultaneously: How Financial Service Providers Manage the Compliance Double Pressure"},"content":{"rendered":"<p style=\"display:inline-block;background:#69d8ed;color:#fff;padding:4px 14px;border-radius:20px;font-size:0.85em;margin-bottom:18px;\">\u23f1 14 min Reading Time<\/p>\n<p><strong>DORA has been applicable since January 2025, NIS2 transposed into German law since December 2025. For financial service providers, this means: two regulations with different deadlines, definitions, and reporting systems &#8211; but massive content overlaps. Those who address both frameworks in isolation double the effort without added value. Those who understand the synergies save millions and build an integrated compliance system that actually delivers security. This article shows where DORA and NIS2 overlap, where they differ, and what financial companies can do once instead of twice.<\/strong><\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">TL;DR<\/h2>\n<ul>\n<li>DORA (Digital Operational Resilience Act) has been in effect since January 17, 2025, NIS2 since December 2025 under German law &#8211; financial service providers must comply with both simultaneously<\/li>\n<li>DORA is lex specialis for the financial sector and takes precedence in case of overlaps, but NIS2 applies additionally where DORA does not cover a specific area<\/li>\n<li>The greatest efficiency lies in an integrated ICT risk management system that serves both frameworks &#8211; instead of two parallel compliance projects<\/li>\n<li>IT third-party risk management (TPRM) is the shared weak point: DORA requires a Register of Information, NIS2 demands supply chain security &#8211; both can be consolidated<\/li>\n<li>Reporting obligations differ significantly: DORA requires a 24-hour initial report to BaFin, NIS2 demands &#8220;immediate&#8221; reporting to the BSI (Federal Office for Information Security) &#8211; two separate systems that must be operated in parallel<\/li>\n<\/ul>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Two Regulations, One Goal &#8211; But Different Paths<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Both DORA and NIS2 pursue the same overarching objective: strengthening cyber resilience in Europe. Both require risk management, incident reporting, penetration testing, and securing supply chains. The fundamental difference lies in scope and specificity.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">DORA is an EU regulation that applies directly &#8211; without national transposition. It targets exclusively the financial sector: banks, insurers, securities firms, payment service providers, crypto asset service providers, and their critical ICT third-party service providers. DORA defines granular requirements for digital operational resilience, from ICT risk management to incident reporting and Threat-Led Penetration Testing (TLPT).<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">NIS2 is an EU directive that had to be transposed into national law. In Germany, this was done through the NIS-2 Implementation and Cybersecurity Strengthening Act, which came into force in December 2025. NIS2 applies across sectors to &#8220;essential&#8221; and &#8220;important&#8221; entities in 18 sectors &#8211; including the financial sector. The requirements are less granular than DORA\u2019s but cover a broader spectrum.<\/p>\n<div style=\"display:flex;flex-wrap:wrap;gap:2px;margin:32px 0;border-radius:12px;overflow:hidden;\">\n<div style=\"flex:1;min-width:140px;background:#004a59;padding:24px 16px;text-align:center;\">\n<div style=\"font-size:11px;text-transform:uppercase;letter-spacing:1px;color:#8bb8c4;margin-bottom:8px;\">DORA APPLICABLE SINCE<\/div>\n<div style=\"font-size:clamp(1.5em,5vw,2.4em);font-weight:800;color:#69d8ed;line-height:1;\">17.01.2025<\/div>\n<div style=\"font-size:13px;color:#a0c4cc;margin-top:8px;\">EU regulation, directly applicable<\/div>\n<\/div>\n<div style=\"flex:1;min-width:140px;background:#004a59;padding:24px 16px;text-align:center;\">\n<div style=\"font-size:11px;text-transform:uppercase;letter-spacing:1px;color:#8bb8c4;margin-bottom:8px;\">NIS2 IN FORCE (DE)<\/div>\n<div style=\"font-size:clamp(1.5em,5vw,2.4em);font-weight:800;color:#69d8ed;line-height:1;\">Dec. 2025<\/div>\n<div style=\"font-size:13px;color:#a0c4cc;margin-top:8px;\">NIS2UmsuCG, national law<\/div>\n<\/div>\n<div style=\"flex:1;min-width:140px;background:#004a59;padding:24px 16px;text-align:center;\">\n<div style=\"font-size:11px;text-transform:uppercase;letter-spacing:1px;color:#8bb8c4;margin-bottom:8px;\">REPORTING OBLIGATION UNDER DORA<\/div>\n<div style=\"font-size:clamp(1.5em,5vw,2.4em);font-weight:800;color:#69d8ed;line-height:1;\">24h<\/div>\n<div style=\"font-size:13px;color:#a0c4cc;margin-top:8px;\">Initial report to BaFin\/EBA<\/div>\n<\/div>\n<\/div>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Lex specialis: What Does DORA\u2019s Precedence Mean?<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">DORA is considered lex specialis over NIS2 in the financial sector. This means: Where DORA defines specific requirements, these take precedence over the more general NIS2 provisions. The NIS2 directive itself confirms this in Article 4(2) and explicitly refers to DORA as a sector-specific regulation.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">In practice, however, this is more complicated than it sounds. The lex specialis principle does not mean NIS2 is irrelevant for financial companies. It only means DORA takes precedence where it regulates the same topics in greater detail. In areas not covered by DORA &#8211; such as supply chain security beyond ICT service providers or the security of OT systems &#8211; NIS2 continues to apply.<\/p>\n<div style=\"background:linear-gradient(135deg,#f0f7ff,#e4f1fd);border-left:4px solid #69d8ed;padding:20px 24px;margin:32px 0;border-radius:0 8px 8px 0;\">\n<p style=\"font-size:1.1em;font-style:italic;line-height:1.6;margin:0;color:#1a3a4a;\">&#8220;DORA as lex specialis does not relieve financial companies of NIS2 obligations. It shifts priorities: DORA defines the &#8216;what&#8217; in detail, while NIS2 fills the gaps. Those who only read DORA systematically overlook obligations.&#8221;<\/p>\n<\/div>\n<p style=\"line-height:1.8;margin-bottom:20px;\">For a detailed look at how BaFin reviews DORA implementation, see our article on MyBusinessFuture: <a href=\"https:\/\/mybusinessfuture.com\/dora-bafin-prueft-finanzinstitute-nachbessern\/\">DORA: BaFin Reviews Financial Institutions<\/a>.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Overlaps: What Only Needs to Be Done Once<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">The good news: About 60-70 percent of DORA and NIS2 requirements overlap in content. Those who leverage these synergies avoid massive duplication of effort. Here are the key areas where a single implementation serves both frameworks:<\/p>\n<h3 style=\"margin-top:32px;margin-bottom:12px;\">ICT Risk Management<\/h3>\n<p style=\"line-height:1.8;margin-bottom:20px;\">DORA (Chapter II, Articles 5-16) requires a comprehensive ICT risk management framework. NIS2 demands in Article 21 &#8220;appropriate and proportionate technical, operational, and organizational measures&#8221; for risk management. In practice: An ICT risk framework built to DORA standards automatically fulfills NIS2\u2019s risk management requirements &#8211; DORA is more detailed and stringent here.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Implement once:<\/strong> ICT risk management framework according to DORA standards. This framework covers all NIS2-relevant risk management requirements.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">\u25cf <strong>Adjust documentation:<\/strong> Supplement DORA documentation with NIS2-specific references to ensure compliance evidence holds up under both regulations.<\/p>\n<h3 style=\"margin-top:32px;margin-bottom:12px;\">Incident Response and Management<\/h3>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Both frameworks require structured incident management. DORA defines detailed requirements for classification, reporting, and follow-up of ICT incidents in Chapter III (Articles 17-23). NIS2 mandates an &#8220;early warning system&#8221; and structured reporting in Article 23.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">The incident management process can be built uniformly. The critical difference lies in reporting channels and deadlines &#8211; more on this in the reporting obligations section.<\/p>\n<h3 style=\"margin-top:32px;margin-bottom:12px;\">Penetration Testing and Vulnerability Management<\/h3>\n<p style=\"line-height:1.8;margin-bottom:20px;\">DORA requires regular penetration tests in Articles 26-27 and, for systemically important institutions, Threat-Led Penetration Testing (TLPT) under the TIBER-EU framework. NIS2 generally calls for &#8220;policies and procedures to assess the effectiveness&#8221; of security measures.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">A DORA-compliant testing program with TLPT far exceeds NIS2\u2019s requirements. Here, the DORA implementation is fully sufficient.<\/p>\n<h3 style=\"margin-top:32px;margin-bottom:12px;\">Business Continuity Management<\/h3>\n<p style=\"line-height:1.8;margin-bottom:20px;\">DORA requires comprehensive ICT business continuity plans (Article 11). NIS2 demands &#8220;maintenance of operations&#8221; and crisis management (Article 21(2c)). Again, a DORA-compliant BCM program covers NIS2\u2019s requirements &#8211; DORA is more specific and stringent.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">The Critical Differences: What Must Be Done Twice<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Despite the synergies, there are areas where DORA and NIS2 diverge substantially, requiring separate measures:<\/p>\n<h3 style=\"margin-top:32px;margin-bottom:12px;\">Reporting Obligations: Two Systems, Two Authorities, Different Deadlines<\/h3>\n<p style=\"line-height:1.8;margin-bottom:20px;\">This is where financial service providers face the greatest operational overhead. DORA and NIS2 both require incident reporting &#8211; but to different authorities with different deadlines and formats:<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>DORA:<\/strong> Report to the competent financial supervisory authority (in Germany: BaFin). Initial report within 24 hours of classifying an incident as &#8220;major ICT-related.&#8221; Intermediate report within 72 hours. Final report within one month. Format: EBA\/ESMA reporting forms.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>NIS2:<\/strong> Report to the competent national authority (in Germany: BSI). &#8220;Immediate&#8221; early warning within 24 hours. Detailed report within 72 hours. Final report within one month. Format: BSI reporting portal.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Although the deadlines sound similar, the reporting systems, forms, and contacts differ. Financial companies must master both reporting channels operationally. Practical tip: Create a unified internal incident report and adapt it to the respective form requirements of BaFin and BSI &#8211; instead of building two completely separate processes.<\/p>\n<h3 style=\"margin-top:32px;margin-bottom:12px;\">IT Third-Party Risk Management: DORA Goes Much Further<\/h3>\n<p style=\"line-height:1.8;margin-bottom:20px;\">The management of ICT third-party service providers is the area where DORA sets the strictest and most detailed requirements of all European regulations. DORA requires:<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Register of Information (RoI):<\/strong> Complete documentation of all contractual agreements with ICT third-party service providers. This register must include granular details: subject matter, data locations, subcontractors, exit strategies, and dependency analyses. The deadline for the first complete RoI was Q1 2026.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Criticality Assessment:<\/strong> Each ICT service provider must be assessed for its criticality to business functions. For &#8220;critical&#8221; providers, stricter requirements apply to contract design, audit rights, and exit scenarios.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">\u25cf <strong>Concentration Risk Analysis:<\/strong> Financial companies must analyze whether they are overly dependent on individual ICT providers &#8211; a particularly relevant issue with hyperscalers (AWS, Azure, GCP).<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">NIS2 also requires &#8220;supply chain security&#8221; (Article 21(2d)), but in far less detail. For financial companies, the DORA TPRM framework is the standard that must be implemented. NIS2\u2019s requirements are included within it.<\/p>\n<h3 style=\"margin-top:32px;margin-bottom:12px;\">Supervisory Framework for Critical ICT Third-Party Service Providers<\/h3>\n<p style=\"line-height:1.8;margin-bottom:20px;\">DORA introduces an entirely new supervisory framework in Chapter V: Critical ICT third-party service providers (such as large cloud providers) will in future be directly supervised by a &#8220;Lead Supervisory Authority&#8221; of the ESAs (EBA, ESMA, EIOPA). This element has no counterpart in NIS2 and affects financial companies indirectly &#8211; they must ensure their critical ICT service providers meet the new supervisory requirements.<\/p>\n<div style=\"background:linear-gradient(135deg,#f0f7ff,#e4f1fd);border-left:4px solid #69d8ed;padding:20px 24px;margin:32px 0;border-radius:0 8px 8px 0;\">\n<p style=\"font-size:1.1em;font-style:italic;line-height:1.6;margin:0;color:#1a3a4a;\">&#8220;The Register of Information is the biggest operational challenge for many financial institutions under DORA. Those who have not systematically documented their ICT supplier relationships so far now face a mountain of catch-up work &#8211; and a deadline that has already passed.&#8221;<\/p>\n<\/div>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">The Integrated Compliance Approach: One Framework for Both<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Instead of treating DORA and NIS2 as two separate compliance projects, financial companies should pursue an integrated approach. The core idea: Build a single governance framework that serves both regulations, using DORA\u2019s requirements as the foundation (since they are more detailed).<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Here\u2019s what an integrated approach looks like in practice:<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Step 1 &#8211; Mapping:<\/strong> Create a cross-reference matrix that assigns each DORA requirement to the corresponding NIS2 requirement. The ESAs and BSI provide mapping documents as a starting point. Identify three categories: &#8220;Covered by DORA,&#8221; &#8220;Covered by NIS2,&#8221; &#8220;Both require separate measures.&#8221;<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Step 2 &#8211; Unified Risk Management:<\/strong> Implement an ICT risk management framework according to DORA standards (Articles 5-16). Supplement it with NIS2-specific elements such as OT security and non-ICT-related supply chain security.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Step 3 &#8211; Parallel Reporting Channels:<\/strong> Build a unified internal incident management process. Implement two parallel outputs at the end of the reporting chain: one to the BaFin reporting system (DORA) and one to the BSI reporting portal (NIS2). The internal process is identical; only the final steps differ.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Step 4 &#8211; Integrated TPRM:<\/strong> Use the DORA Register of Information as the central database for all third-party risk management. Expand it to include non-ICT suppliers relevant under NIS2.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">\u25cf <strong>Step 5 &#8211; Governance:<\/strong> Establish a single governance structure (e.g., a &#8220;Digital Resilience Committee&#8221;) responsible for both DORA and NIS2 compliance. Avoid parallel compliance teams for different regulations.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Register of Information: The Practical Challenge<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">The DORA Register of Information (RoI) deserves special attention because it is the most labor-intensive single requirement for many institutions. The RoI must document all contractual agreements with ICT third-party service providers &#8211; including details that many companies have not previously recorded centrally:<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Contract Details:<\/strong> Subject matter, duration, termination periods, SLAs, liability provisions<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Data Locations:<\/strong> Where are data processed and stored? Which jurisdictions are affected?<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Subcontractor Chains:<\/strong> Which sub-service providers does the ICT provider use? Where are they located?<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Dependency Analysis:<\/strong> Which business functions depend on this service provider? What happens in case of failure?<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">\u25cf <strong>Exit Strategy:<\/strong> How can the service provider be replaced? Which data must be migrated?<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Institutions that have not yet completed the RoI should prioritize pragmatically: Start with the most critical service providers (cloud providers, core banking systems, payment infrastructure) and expand gradually. BaFin has signaled that it will assess progress and methodology during the initial review &#8211; not just the final result.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Management on the Hook: Liability Under DORA and NIS2<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Both DORA and NIS2 emphasize management\u2019s responsibility for cybersecurity. DORA explicitly holds the management body responsible for approving and overseeing the ICT risk management framework (Article 5(2)). NIS2 requires that management bodies approve risk management measures, monitor their implementation, and participate in cybersecurity training (Article 20).<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Under German implementation, managing directors and board members can be held personally liable if they fail to meet their oversight obligations. The fines are substantial: up to 10 million euros or 2 percent of global annual turnover under NIS2, with comparable amounts under DORA.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">The practical consequence: Cybersecurity is no longer an IT issue that can be delegated to the CISO. Board members and managing directors must be demonstrably involved &#8211; in decisions, approvals, and regular reviews.<\/p>\n<blockquote style=\"margin:32px 0;padding:24px 28px;background:linear-gradient(135deg,#f0f9fc 0%,#e0f3f8 100%);border-left:4px solid #69d8ed;border-radius:0 8px 8px 0;font-size:1.25em;line-height:1.5;color:#0a1628;font-style:italic;font-weight:600;\"><p>\n&#8220;GAP assessment against both frameworks: Don\u2019t review DORA and NIS2 separately, but conduct an integrated GAP analysis.&#8221;\n<\/p><\/blockquote>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Practical Checklist: Managing the DORA + NIS2 Double Pressure<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">For financial companies looking to efficiently manage the compliance double pressure, here are the concrete next steps:<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>GAP Assessment Against Both Frameworks:<\/strong> Don\u2019t review DORA and NIS2 separately, but conduct an integrated GAP analysis. Result: A consolidated action plan instead of two.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Complete the Register of Information:<\/strong> If not already done, start immediately with the top 20 ICT service providers. Don\u2019t wait for perfection &#8211; an 80% RoI that exists is better than a 100% RoI that will be ready in six months.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Set Up Dual Reporting Processes:<\/strong> Implement a unified internal incident process with two outputs (BaFin + BSI). Conduct test reports before an actual incident occurs.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Plan the TLPT Program:<\/strong> For systemically important institutions, Threat-Led Penetration Testing is mandatory under DORA. The effort is considerable (6-12 months per TLPT cycle) &#8211; start early with a qualified TLPT provider.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Train Management:<\/strong> Board members and management must be demonstrably trained under both frameworks. Establish a joint training program that addresses DORA and NIS2 in an integrated manner.<\/p>\n<p style=\"line-height:1.8;margin-bottom:18px;\">\u25cf <strong>Assess Concentration Risk:<\/strong> Analyze dependencies on individual cloud providers and ICT service providers. Document multi-cloud and exit strategies.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">\u25cf <strong>Review Contracts:<\/strong> Audit all ICT contracts against DORA requirements (audit rights, subcontractor clauses, exit provisions). Initiate renegotiations early.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Outlook: Regulatory Density Continues to Increase<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">DORA and NIS2 are not the last regulations that will impact financial companies in cybersecurity. With the EU AI Act, the Cyber Resilience Act, and the Data Act, additional frameworks are coming that will overlap and need to be considered in an integrated manner.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Financial institutions that now build a flexible, integrated compliance framework will more easily absorb these additional regulations than companies that treat each new law as an isolated project. The integrated approach pays off not only in the short term &#8211; it is the only scalable strategy for Europe\u2019s increasing regulatory density.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">The supervisory authorities &#8211; BaFin and BSI &#8211; are aware of the double burden and are working on coordinated audit approaches. Nevertheless, the responsibility for efficient implementation lies with the companies themselves. Those who leverage synergies now will not only save compliance costs but build digital resilience that truly protects. For a detailed overview of NIS2 requirements, see our article <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/12\/nis2-in-deutschland-was-unternehmen-jetzt-wissen-und-umsetzen-muessen\/\">NIS2 in Germany: What Companies Need to Know and Implement Now<\/a>.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Frequently Asked Questions<\/h2>\n<h3>Do financial companies have to comply with both DORA and NIS2?<\/h3>\n<p>Yes. DORA applies as lex specialis and takes precedence in case of overlaps, but NIS2 applies additionally in areas not covered by DORA. Financial companies must be familiar with both frameworks and meet their respective requirements. An integrated compliance approach avoids duplication of effort.<\/p>\n<h3>To whom must security incidents be reported?<\/h3>\n<p>Under DORA, to the competent financial supervisory authority (BaFin) within 24 hours. Under NIS2, to the BSI, also &#8220;immediately&#8221; (in practice, within 24 hours). Both reports must be submitted in parallel &#8211; they involve different reporting systems and forms.<\/p>\n<h3>What is the Register of Information, and by when must it be completed?<\/h3>\n<p>The Register of Information is a complete documentation of all contractual agreements with ICT third-party service providers under DORA. It must include details on the subject matter, data locations, subcontractors, dependencies, and exit strategies. The deadline for the first complete register was Q1 2026. Institutions that have not yet completed it should start immediately with the most critical service providers.<\/p>\n<h3>Is management personally liable?<\/h3>\n<p>Yes, under both frameworks. DORA holds the management body responsible for approving and overseeing the ICT risk management framework. NIS2 provides for personal liability if management fails to meet its oversight obligations. Managing directors and board members must be demonstrably involved in cybersecurity decisions.<\/p>\n<h3>How can compliance costs for DORA and NIS2 be reduced?<\/h3>\n<p>Through an integrated compliance approach: Build a single governance framework that serves both regulations. Use DORA\u2019s requirements as the foundation (since they are more detailed) and specifically supplement NIS2 gaps. Conduct a unified GAP analysis instead of two separate ones. Consistently leverage synergies in risk management, BCM, and testing. Avoid parallel compliance teams.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Further Reading<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/12\/nis2-in-deutschland-was-unternehmen-jetzt-wissen-und-umsetzen-muessen\/\">NIS2 in Germany: What Companies Need to Know and Implement Now<\/a><\/li>\n<li><a href=\"https:\/\/mybusinessfuture.com\/dora-bafin-prueft-finanzinstitute-nachbessern\/\">DORA: BaFin Reviews Financial Institutions &#8211; MyBusinessFuture<\/a><\/li>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/05\/cyber-insurance-2026-what-companies-need-to-know-before-taking-out-a-policy\/\">Cyber Insurance 2026: What Companies Need to Know<\/a><\/li>\n<\/ul>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">More from the MBF Media Network<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.cloudmagazin.com\/en\/2026\/03\/03\/finops-wie-unternehmen-cloud-kosten-endlich-in-den-griff-bekommen\/\">FinOps: How Companies Get a Grip on Cloud Costs &#8211; cloudmagazin<\/a><\/li>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/06\/post_id-3837\/\">Cybersecurity Trends 2026: Seven Developments &#8211; SecurityToday<\/a><\/li>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/02\/post_id-3544\/\">Supply Chain Security 2026 &#8211; SecurityToday<\/a><\/li>\n<\/ul>\n<p style=\"text-align:right;font-style:italic;margin-top:32px;\">Header Image Source: Pexels \/ Sora Shimazaki<\/p>\n","protected":false},"excerpt":{"rendered":"\u23f1 14 min Reading Time DORA has been applicable since January 2025, NIS2 transposed into German law since December 2025. For financial service providers, this means: two regulations with different deadlines, definitions, and reporting systems &#8211; but massive content overlaps. Those who address both frameworks in isolation double the effort without added value. Those who [&hellip;]","protected":false},"author":55,"featured_media":5329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"dora and nis2","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"DORA and NIS2 compliance made simple\u2014reduce risk, avoid fines, and streamline efforts for financial firms. Learn how to succeed with both now.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":0,"_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":0,"footnotes":""},"categories":[215,251],"tags":[],"class_list":["post-7899","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies","category-news"],"wpml_language":"en","wpml_translation_of":5311,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=7899"}],"version-history":[{"count":5,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7899\/revisions"}],"predecessor-version":[{"id":11881,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7899\/revisions\/11881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/5329"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=7899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=7899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=7899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}