<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News arşivleri - Bexta</title>
	<atom:link href="https://bexta.de/category/news/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Sat, 11 Apr 2026 13:49:18 +0000</lastBuildDate>
	<language>de</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bexta.de/wp-content/uploads/2025/05/cropped-250516_bexta_logo_marke_blue-32x32.png</url>
	<title>News arşivleri - Bexta</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DORA IKT-Kontrollfunktion als Managed Service</title>
		<link>https://bexta.de/dora-ikt-kontrollfunktion-als-managed-service/</link>
		
		<dc:creator><![CDATA[Erdinc Bulat]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 11:33:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://bexta.de/?p=2720</guid>

					<description><![CDATA[<p>DORA rückt die IKT-Kontrollfunktion ins Zentrum  Seit dem 17. Januar 2025 ist die Digital Operational Resilience Act (DORA) verbindlich umgesetzt – und damit auch die Anforderung einer eigenständigen IKT-Kontrollfunktion im Finanzsektor. Im Kern von DORA stehen Artikel 5–6 (IKT‑Risikomanagement) sowie Artikel 15 (Kontrollen) und Artikel 28–30 (Auslagerung, IKT‑Drittdienstleister).[1][2][3][4]  Für Vorstand, CIO, CISO und CRO bedeutet das:  Die IKT‑Risiken sind nicht länger ein reines IT‑Thema, sondern ein Geschäfts‑ [&#8230;]</p>
<p><a href="https://bexta.de/dora-ikt-kontrollfunktion-als-managed-service/">DORA IKT-Kontrollfunktion als Managed Service</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2720" class="elementor elementor-2720" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-364eb8ae e-flex e-con-boxed e-con e-parent" data-id="364eb8ae" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-42b358e0 elementor-widget elementor-widget-spacer" data-id="42b358e0" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-3b07ba9a e-flex e-con-boxed e-con e-parent" data-id="3b07ba9a" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-9615220 e-con-full e-flex e-con e-child" data-id="9615220" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-d26101 elementor-widget elementor-widget-post-info" data-id="d26101" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-c11abe6 elementor-inline-item" itemprop="datePublished">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>11/04/2026</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-441d57a elementor-inline-item" itemprop="about">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<span class="elementor-post-info__terms-list-item">News</span>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-5e09d054 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="5e09d054" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">DORA IKT-Kontrollfunktion als Managed Service</h1>				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-3f5555c1 e-flex e-con-boxed e-con e-parent" data-id="3f5555c1" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-403ec931 e-con-full e-flex e-con e-child" data-id="403ec931" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3d80bc96 elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image" data-id="3d80bc96" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-featured-image.default">
				<div class="elementor-widget-container">
															<img fetchpriority="high" decoding="async" width="1184" height="864" src="https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915281401.webp" class="attachment-full size-full wp-image-2750" alt="" srcset="https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915281401.webp 1184w, https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915281401-300x219.webp 300w, https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915281401-1024x747.webp 1024w, https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915281401-768x560.webp 768w" sizes="(max-width: 1184px) 100vw, 1184px" />															</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-4b0825f3 e-flex e-con-boxed e-con e-parent" data-id="4b0825f3" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6ed22d7b e-con-full e-flex e-con e-child" data-id="6ed22d7b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5e7969bd elementor-widget elementor-widget-text-editor" data-id="5e7969bd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h2><b><span data-contrast="none">DORA rückt die IKT-Kontrollfunktion ins Zentrum</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h2><p><span data-contrast="none">Seit dem 17. Januar 2025 ist die </span><b><span data-contrast="none">Digital Operational Resilience Act (DORA)</span></b><span data-contrast="none"> verbindlich umgesetzt – und damit auch die Anforderung einer eigenständigen </span><b><span data-contrast="none">IKT-Kontrollfunktion</span></b><span data-contrast="none"> im Finanzsektor. Im Kern von DORA stehen </span><b><span data-contrast="none">Artikel 5–6 (IKT‑Risikomanagement)</span></b><span data-contrast="none"> sowie </span><b><span data-contrast="none">Artikel 15 (Kontrollen)</span></b><span data-contrast="none"> und </span><b><span data-contrast="none">Artikel 28–30 (Auslagerung, IKT‑Drittdienstleister)</span></b><span data-contrast="none">.</span><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Für Vorstand, CIO, CISO und CRO bedeutet das:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Die IKT‑Risiken sind nicht länger ein reines IT‑Thema, sondern ein </span><b><span data-contrast="none">Geschäfts‑ und Governance‑Thema</span></b><span data-contrast="none">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Die bisherige Trennung von IT‑Betrieb, Informationssicherheit und internen Kontrollen reicht regulatorisch nicht mehr aus.</span><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">In der Praxis stehen viele Institute vor einem Dilemma: </span><b><span data-contrast="none">Anforderungen steigen, Personal ist knapp und die Unabhängigkeit der IKT‑Kontrollfunktion bleibt unklar.</span></b><span data-contrast="none"> Genau hier kommt ein DORA‑konformer </span><b><span data-contrast="none">Managed Service für die IKT‑Kontrollfunktion</span></b><span data-contrast="none"> ins Spiel – und Bexta als operativer Umsetzungspartner, der die Funktion rechtssicher und revisionssicher auslagern kann.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><h2><b><span data-contrast="none">Was DORA bei der IKT-Kontrollfunktion verlangt</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h2><p><span data-contrast="none">DORA verankert die IKT‑Kontrollfunktion explizit im IKT‑Risikomanagementrahmen.</span><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol><li><b><span data-contrast="none"> Unabhängigkeit der IKT‑Kontrollfunktion (Art. 6 DORA)</span></b></li></ol><p><span data-contrast="none">DORA verlangt, dass Finanzunternehmen, die keine „Kleinstunternehmen“ sind, die Zuständigkeit für das Management und die Überwachung des IKT‑Risikos an eine </span><b><span data-contrast="none">kontrollweise Funktion</span></b><span data-contrast="none"> übertragen.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="34" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Diese Funktion ist klar von den operativen IT‑Einheiten zu trennen, um </span><b><span data-contrast="none">Interessenkonflikte</span></b><span data-contrast="none"> zu vermeiden.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="34" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Die Unabhängigkeit muss auch in Konzernstrukturen gewährleistet sein – also nicht nur „organisatorisch“, sondern auch </span><b><span data-contrast="none">fachlich und hierarchisch</span></b><span data-contrast="none">.</span><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="2"><li><b><span data-contrast="none"> Permanente Überwachung und Wirksamkeitsnachweis</span></b></li></ol><p><span data-contrast="none">Die Kontrollfunktion ist nicht nur ein „Papiergefüge“, sondern eine </span><b><span data-contrast="none">betriebliche Stelle</span></b><span data-contrast="none"> mit Daueraufgaben:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Regelmäßige Überprüfung der IKT‑Risikomanagementprozesse (Art. 6 DORA).</span><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Kontinuierliche Bewertung der Wirksamkeit der IKT‑Kontrollen (z.B. Richtlinien, Change‑, Patch‑ und Ausfall‑Prozesse).</span><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><a href="bookmark://fn8"><span data-contrast="auto">[8]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Dokumentation der Wirksamkeitsprüfungen für Aufsicht und Prüfer (BaFin, EZB, Wirtschaftsprüfer).</span><a href="bookmark://fn9"><span data-contrast="auto">[9]</span></a><a href="bookmark://fn10"><span data-contrast="auto">[10]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="3"><li><b><span data-contrast="none">Governance‑Strukturen nach DORA (Art. 5–6, 15)</span></b></li></ol><p><span data-contrast="none">DORA erweitert den bestehenden Ansatz von </span><b><span data-contrast="none">Three‑Lines‑of‑Defence‑Modellen</span></b><span data-contrast="none"> auf den IKT‑Bereich:</span><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">1. Linie:</span></b><span data-contrast="none"> Betrieb (IT, Infrastruktur, Cloud, Business‑Applikationen).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">2. Linie:</span></b><span data-contrast="none"> IKT‑Risiko‑ und Compliance‑Funktionen (inkl. DORA‑Governance).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">3. Linie:</span></b><span data-contrast="none"> Audit bzw. IKT‑Kontrollfunktion (Art. 15, 6 Abs. 4).</span><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Dabei verlangt DORA, dass die IKT‑Kontrollfunktion über </span><b><span data-contrast="none">klare Ziele, Leistungsindikatoren und Risikokennzahlen</span></b><span data-contrast="none"> verfügt, die regelmässig an das Management berichtet werden.</span><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><h2><b><span data-contrast="none">Die Realität in Finanzinstituten: Trennung von IT und Kontrolle bleibt schwach</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h2><p><span data-contrast="none">Studien und Aufsichtsmitteilungen zeigen ein klares Muster:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="37" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">BaFin‑Aufsichtsmitteilungen zur DORA‑Umsetzung im IKT‑Risikomanagement betonen, dass die </span><b><span data-contrast="none">Trennung zwischen Betrieb und Kontrolle</span></b><span data-contrast="none"> in vielen Instituten noch unklar ist.</span><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><a href="bookmark://fn9"><span data-contrast="auto">[9]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="37" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Beratungsstudien (z.B. KPMG, PwC) führen aus, dass gerade bei kleineren Instituten häufig </span><b><span data-contrast="none">ein und dieselbe Abteilung</span></b><span data-contrast="none"> für IT‑Betrieb, Informationssicherheit und IKT‑Risiko‑Kontrolle zuständig ist – was DORA‑Konformität gefährdet.</span><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><h3><b><span data-contrast="none">Typische Probleme</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h3><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="38" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Fehlende formale Trennung</span></b><span data-contrast="none">:</span> <br /><span data-contrast="none">IT‑Security‑Verantwortliche sind gleichzeitig für die Einrichtung von Controls und deren Prüfung, was die </span><b><span data-contrast="none">Unabhängigkeit</span></b><span data-contrast="none"> der IKT‑Kontrollfunktion untergräbt.</span><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="38" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Personalmangel im IT‑Risk‑ &amp; Compliance‑Bereich</span></b><span data-contrast="none">:</span> <br /><span data-contrast="none">Branchenanalysen zeigen, dass das Angebot an spezialisiertem IKT‑Risk‑ und Compliance‑Personal in Deutschland und der EU deutlich </span><b><span data-contrast="none">unter der Nachfrage</span></b><span data-contrast="none"> liegt. Insbesondere im Bereich DORA‑Governance und Drittparteienrisikomanagement fehlen oft qualifizierte, langfristig verfügbare Kräfte.</span><a href="bookmark://fn13"><span data-contrast="auto">[13]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="38" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Überlastete Compliance‑Abteilungen</span></b><span data-contrast="none">:</span> <br /><span data-contrast="none">Bestehende Compliance‑Abteilungen werden zusätzlich mit DORA‑, MiFID‑II‑, ESG‑ und anderen Themen konfrontiert. Die </span><b><span data-contrast="none">IKT‑Kontrollfunktion</span></b><span data-contrast="none"> degeneriert häufig zu einer „Zusatzfunktion“, nicht zu einer klar definierbaren, operativen Stelle.</span><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Das Ergebnis: Viele Institute erfüllen die DORA‑Vorgaben in der Theorie, haben aber </span><b><span data-contrast="none">keine nachweisbare, unabhängige IKT‑Kontrollfunktion</span></b><span data-contrast="none"> installiert – und damit ein klares Audit‑ und Aufsichtsrisiko.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><h2><b><span data-contrast="none">Daten &amp; Studien: Fachkräftemangel, Audit‑Findings und Kosten</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h2><p><span data-contrast="none">Um die Dringlichkeit zu verstehen, helfen konkrete Kennzahlen und Benchmarks:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Fachkräftemangel im IT‑Risk‑ &amp; Compliance‑Bereich:</span></b> <br /><span data-contrast="none">Eine Studie der Wirtschaftsprüfungsgesellschaften 2025 kommt zu dem Ergebnis, dass knapp </span><b><span data-contrast="none">60% der Banken und Versicherungen</span></b><span data-contrast="none"> Schwierigkeiten haben, qualifizierte Mitarbeitende für IKT‑Risiko‑ und Compliance‑Funktionen zu rekrutieren.</span><a href="bookmark://fn13"><span data-contrast="auto">[13]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Audit‑Findings zu DORA‑Governance:</span></b> <br /><span data-contrast="none">Prüfungen und Aufsichtsbesuche zeigen, dass bei </span><b><span data-contrast="none">über 40% der untersuchten Institute</span></b><span data-contrast="none"> die Unabhängigkeit der IKT‑Kontrollfunktion, die Dokumentation der Wirksamkeitsprüfungen oder die Abgrenzung zu operativen IT‑Bereichen als kritische Mängel angezeigt werden.</span><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Kosten durch Nicht‑Compliance und Nacharbeit:</span></b> <br /><span data-contrast="none">Modellrechnungen schätzen, dass die Behebung von Governance‑Mängeln nach einem Audit (z.B. DORA‑Fehler, fehlende Wirksamkeitsnachweise) durchschnittlich </span><b><span data-contrast="none">20–30% höhere personelle und Projekt‑Kosten</span></b><span data-contrast="none"> verursacht als eine vorausschauende, strukturierte Einrichtung der IKT‑Kontrollfunktion.</span><a href="bookmark://fn14"><span data-contrast="auto">[14]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Dazu kommen </span><b><span data-contrast="none">regulatorische und reputationsbezogene Risiken</span></b><span data-contrast="none"> (Sanktionen, Aufsichtsauflagen, Vertrauensverlust), die sich schwer in Geld bemessen, aber für Banken und Versicherungen existenzrelevant sein können.</span><a href="bookmark://fn15"><span data-contrast="auto">[15]</span></a><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><h2><b><span data-contrast="none">Warum die IKT‑Kontrollfunktion so kritisch ist</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h2><p><span data-contrast="none">Die IKT‑Kontrollfunktion nach DORA ist nicht nur ein technisches, sondern ein </span><b><span data-contrast="none">verantwortungspolitisches und haftungsrelevantes Element</span></b><span data-contrast="none"> der Governance‑Architektur.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol><li><b><span data-contrast="none"> Verantwortung gegenüber BaFin, EZB und Prüfern</span></b></li></ol><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="40" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Die BaFin verlangt in ihrer Aufsichtsmitteilung zur Umsetzung von DORA klare Rollenverteilungen zwischen IT‑Betrieb, IKT‑Risikomanagement und IKT‑Kontrollfunktion.</span><a href="bookmark://fn9"><span data-contrast="auto">[9]</span></a><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="40" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">EZB‑ und nationalen Aufsichtsbehörden können im Rahmen von DORA </span><b><span data-contrast="none">Inspektionen, Befragungen und Dokumentationsanforderungen</span></b><span data-contrast="none"> stellen; fehlende oder inkonsistente Nachweise zur IKT‑Kontrollfunktion sind direkte Ansatzpunkte für Kritik und Maßnahmen.</span><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><a href="bookmark://fn15"><span data-contrast="auto">[15]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="2"><li><b><span data-contrast="none"> Haftungsrisiken für Management und Verwaltung</span></b></li></ol><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">DORA verankert eine klare Verantwortung der Unternehmensleitung für die Einrichtung eines wirksamen IKT‑Risikomanagementrahmens.</span><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Wenn die IKT‑Kontrollfunktion in der Praxis schwach oder nicht unabhängig ist, erhöht sich das Risiko, dass Vorstände und Geschäftsführer im Rahmen von </span><b><span data-contrast="none">Aufsichts‑ oder Haftungsverfahren</span></b><span data-contrast="none"> als Verantwortungsträger in der Haftung stehen.</span><a href="bookmark://fn15"><span data-contrast="auto">[15]</span></a><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="3"><li><b><span data-contrast="none"> Reputationsrisiken und Marktvertrauen</span></b></li></ol><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="42" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Öffentliche Aufsichtsmaßnahmen, Geldstrafen oder wiederholte Audit‑Mängel zu DORA‑Governance wirken sich direkt auf die </span><b><span data-contrast="none">Kredit‑ und Prämienkonditionen, Rating und Investorenvertrauen</span></b><span data-contrast="none"> aus.</span><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="42" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Die Rolle der IKT‑Kontrollfunktion als „Fels in der Brandung“ der digitalen Resilienz ist damit ein zentraler Bestandteil der </span><b><span data-contrast="none">Vertrauensarchitektur</span></b><span data-contrast="none"> eines Instituts.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><h3><b><span data-contrast="none">Outsourcing als strategische Lösung: IKT‑Kontrollfunktion auslagern</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h3><p><span data-contrast="none">DORA regelt die Auslagerung von IKT‑Funktionen explizit in </span><b><span data-contrast="none">Artikel 28–30</span></b><span data-contrast="none"> und macht klar: </span><b><span data-contrast="none">Finanzunternehmen dürfen die IKT‑Kontrollfunktion auslagern</span></b><span data-contrast="none">, solange die Verantwortung beim Unternehmen selbst bleibt.</span><a href="bookmark://fn16"><span data-contrast="auto">[16]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol><li><b><span data-contrast="none"> Auslagerung ist erlaubt – und sinnvoll</span></b></li></ol><p><span data-contrast="none">DORA bestimmt, dass:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Verträge mit IKT‑Dienstleistern klar rechtliche Rechte und Pflichten dokumentieren müssen.</span><a href="bookmark://fn17"><span data-contrast="auto">[17]</span></a><a href="bookmark://fn15"><span data-contrast="auto">[15]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Das Unternehmen </span><b><span data-contrast="none">uneingeschränkt für die Erfüllung der DORA‑Pflichten verantwortlich</span></b><span data-contrast="none"> bleibt, auch wenn Teile der IKT‑Risiko‑Kontrolle an einen Drittanbieter ausgelagert sind.</span><a href="bookmark://fn16"><span data-contrast="auto">[16]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Aus Sicht der Aufsicht wirkt die Auslagerung jedoch </span><b><span data-contrast="none">nicht als Verschleierung</span></b><span data-contrast="none">, wenn:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="44" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">der Service‑Provider </span><b><span data-contrast="none">unabhängig von operativen IT‑Lieferanten</span></b><span data-contrast="none"> ist,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="44" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">die Verträge die DORA‑Mindestanforderungen abbilden, und</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="44" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">die Wirksamkeit der Kontrollen regelmäßig geprüft und dokumentiert wird.</span><a href="bookmark://fn16"><span data-contrast="auto">[16]</span></a><a href="bookmark://fn13"><span data-contrast="auto">[13]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="2"><li><b><span data-contrast="none">Vorteileeines outsourced DORA‑Managed Service</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ol><p><span data-contrast="none">Ein DORA‑konformer Managed Service für die IKT‑Kontrollfunktion bietet:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="45" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Unabhängigkeit:</span></b> <br /><span data-contrast="none">Der Partner steht fachlich und organisch außerhalb der eigenen IT‑Betriebsstrukturen und kann damit einen objektiven, kontrollgerechten Spiegel bieten.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="45" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Skalierbarkeit:</span></b> <br /><span data-contrast="none">Die angebotene Kapazität lässt sich an die Größe des Instituts und die Komplexität der IKT‑Landschaft anpassen – ohne permanente Neueinstellungen im eigenen Haus.</span><a href="bookmark://fn14"><span data-contrast="auto">[14]</span></a><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="45" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Fachexpertise:</span></b> <br /><span data-contrast="none">Spezialisierte DORA‑Anbieter bringen </span><b><span data-contrast="none">tiefes Wissen zu Artikel 5–6, 15 und 28–30</span></b><span data-contrast="none"> sowie Erfahrung aus Aufsichts‑ und Prüfungssituationen mit.</span><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><h2><b><span data-contrast="none">Bexta GmbH als DORA‑konforme IKT‑Kontrollfunktion (Managed Service)</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h2><p><span data-contrast="none">Bexta GmbH positioniert sich nicht als klassische Beratung, sondern als </span><b><span data-contrast="none">operativer Partner</span></b><span data-contrast="none">, der die IKT‑Kontrollfunktion nach DORA als </span><b><span data-contrast="none">unabhängigen, revisionssicheren Managed Service</span></b><span data-contrast="none"> betreibt.</span><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">IKT‑Kontrollfunktion als DORA‑konformer Managed Service</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">DORA erlaubt, die IKT‑Kontrollfunktion im Rahmen der Verordnung auszulagern, solange das Finanzunternehmen die Verantwortung behält. Bexta versteht dieses Modell als logische Konsequenz aus:</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="46" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">steigender regulatorischer Komplexität,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="46" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Engpässen im IKT‑Risk‑ und Compliance‑Personal,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="46" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">und der Notwendigkeit, eine klare Trennung zwischen Betrieb und Kontrolle herzustellen.</span><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Die IKT‑Kontrollfunktion bei Bexta ist:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="47" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Unabhängig</span></b><span data-contrast="none">: organisatorisch und fachlich getrennt von Ihren IT‑Betriebs‑ und Security‑Teams.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="47" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Revisionssicher</span></b><span data-contrast="none">: Prozesse und Nachweise sind auf BaFin‑ und EZB‑Aufsichtsstandards ausgelegt.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="47" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Auf Augenhöhe mit Aufsicht und Prüfern</span></b><span data-contrast="none">: Bexta arbeitet mit denselben regulatorischen Rahmenwerken wie BaFin, EBA und nationale Prüfer.</span><a href="bookmark://fn9"><span data-contrast="auto">[9]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><h3><b><span data-contrast="none">Leistungen im Überblick</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></h3><p><span data-contrast="none">Als DORA‑konforme IKT‑Kontrollfunktion im Rahmen eines Managed Services übernimmt Bexta u. a.:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Überwachung der DORA‑IKT‑Governance</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Regelmäßige Überprüfung, ob Ihre IKT‑Risikomanagementprozesse die DORA‑Anforderungen (Art. 5–6, 15) erfüllen.</span><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">Identifikation von Lücken in Politiken, Prozessen und Rollen.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Kontrolle von Richtlinien und Prozessen</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Prüfung der Umsetzung von IKT‑Richtlinien (z.B. Change‑Management, Patch‑Management, Access‑Control, Backup‑Prozesse).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">Abgleich der Prozessdokumentation mit dem operativen IT‑Tagesgeschäft.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Wirksamkeitsprüfungen der IKT‑Kontrollen</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Regelmäßige Stichprobenprüfungen (Testing) der Kontrollen.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">Quantifizierung von Risiko‑KPIs und Performance‑Indikatoren für das IKT‑Risikomanagement.</span><a href="bookmark://fn8"><span data-contrast="auto">[8]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">Unabhängige Risiko‑ &amp; Incidentbewertung</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Begleitung und Bewertung von IKT‑Vorfällen im Rahmen der DORA‑Melderegeln.</span><a href="bookmark://fn18"><span data-contrast="auto">[18]</span></a><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">Prüfung der Umsetzung von Maßnahmen nach Vorfallanalysen.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">Prüfungsbegleitung (BaFin, EZB, Wirtschaftsprüfer)</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Vorbereitung und Aufbereitung von Nachweisen, Prüfungsunterlagen und Reporting‑Dokumentation.</span><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><a href="bookmark://fn9"><span data-contrast="auto">[9]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="48" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">Direkte Mitwirkung bei Audits und Aufs</span> <br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">⁂</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><a href="https://www.gleisslutz.com/de/know-how/dora-umfangreiche-compliance-pflichten-fuer-unternehmen-aus-dem-finanzsektor-beim-umgang-mit-ikt-risiken"><span data-contrast="auto">https://www.gleisslutz.com/de/know-how/dora-umfangreiche-compliance-pflichten-fuer-unternehmen-aus-dem-finanzsektor-beim-umgang-mit-ikt-risiken</span></a><span data-contrast="none">    </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><a href="https://nis2-umsetzung.com/dora-vo/artikel-6-ikt-risikomanagementrahmen/"><span data-contrast="auto">https://nis2-umsetzung.com/dora-vo/artikel-6-ikt-risikomanagementrahmen/</span></a><span data-contrast="none">            </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><a href="https://bexta.de/dora/ikt-kontrollfunktion-als-managed-service/"><span data-contrast="auto">https://bexta.de/dora/ikt-kontrollfunktion-als-managed-service/</span></a><span data-contrast="none">             </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><a href="https://www.wko.at/oe/information-consulting/finanzdienstleister/digital-operational-resilience-act"><span data-contrast="auto">https://www.wko.at/oe/information-consulting/finanzdienstleister/digital-operational-resilience-act</span></a><span data-contrast="none">     </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><a href="https://www.advisori.de/blog/neue-bafin-aufsichtsmitteilung-zu-dora"><span data-contrast="auto">https://www.advisori.de/blog/neue-bafin-aufsichtsmitteilung-zu-dora</span></a><span data-contrast="none">      </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="6" data-aria-level="1"><a href="https://banking.vision/ikt-kontrollfunktion/"><span data-contrast="auto">https://banking.vision/ikt-kontrollfunktion/</span></a><span data-contrast="none">      </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="7" data-aria-level="1"><a href="https://de.linkedin.com/pulse/dora-die-vorgaben-f%C3%BCr-das-ikt-risikomanagement-michaela-witzel"><span data-contrast="auto">https://de.linkedin.com/pulse/dora-die-vorgaben-für-das-ikt-risikomanagement-michaela-witzel</span></a><span data-contrast="none">   </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="8" data-aria-level="1"><a href="https://simplifylabs.io/dora-compliance-strategies-2025/"><span data-contrast="auto">https://simplifylabs.io/dora-compliance-strategies-2025/</span></a><span data-contrast="none">  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="9" data-aria-level="1"><a href="https://www.aba-online.de/infothek/aktuelles/hintergruende/2024-09-27-dora-vo-bafin-aufsichtsmitteilung-digitale-veranstaltung-am-26092024"><span data-contrast="auto">https://www.aba-online.de/infothek/aktuelles/hintergruende/2024-09-27-dora-vo-bafin-aufsichtsmitteilung-digitale-veranstaltung-am-26092024</span></a><span data-contrast="none">     </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="10" data-aria-level="1"><a href="https://trilio.io/resources/dora-compliance/"><span data-contrast="auto">https://trilio.io/resources/dora-compliance/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="11" data-aria-level="1"><a href="https://www.cmshs-bloggt.de/rechtsthemen/digital-operational-resilience-act-dora/dora-fuehrt-zu-gesteigerten-compliance-anforderungen-im-finanzsektor/"><span data-contrast="auto">https://www.cmshs-bloggt.de/rechtsthemen/digital-operational-resilience-act-dora/dora-fuehrt-zu-gesteigerten-compliance-anforderungen-im-finanzsektor/</span></a><span data-contrast="none">     </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="12" data-aria-level="1"><a href="https://kpmg.com/de/de/themen/corporate-governance-und-compliance/digital-operational-resilience-act-das-kommt-auf-die-finanzbranche-zu.html"><span data-contrast="auto">https://kpmg.com/de/de/themen/corporate-governance-und-compliance/digital-operational-resilience-act-das-kommt-auf-die-finanzbranche-zu.html</span></a><span data-contrast="none">       </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="13" data-aria-level="1"><a href="https://simpliant.eu/insights/so-setzen-sie-dora-in-ihrem-unternehmen-um-teil-2"><span data-contrast="auto">https://simpliant.eu/insights/so-setzen-sie-dora-in-ihrem-unternehmen-um-teil-2</span></a><span data-contrast="none">   </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="14" data-aria-level="1"><a href="https://www.activemind.de/magazin/vereinfachter-risikomanagementrahmen-dora/"><span data-contrast="auto">https://www.activemind.de/magazin/vereinfachter-risikomanagementrahmen-dora/</span></a><span data-contrast="none">  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="15" data-aria-level="1"><a href="https://www.dlapiper.com/de-de/insights/publications/2022/12/der-digital-operational-resilience-act"><span data-contrast="auto">https://www.dlapiper.com/de-de/insights/publications/2022/12/der-digital-operational-resilience-act</span></a><span data-contrast="none">    </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="16" data-aria-level="1"><a href="https://www.openkritis.de/eu/dora-digital-operational-resilience-act_nis-2_en.html"><span data-contrast="auto">https://www.openkritis.de/eu/dora-digital-operational-resilience-act_nis-2_en.html</span></a><span data-contrast="none">   </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="17" data-aria-level="1"><a href="https://www.datenschutzticker.de/2025/01/dora-cybersicherheitsregeln-fuer-finanzsektor/"><span data-contrast="auto">https://www.datenschutzticker.de/2025/01/dora-cybersicherheitsregeln-fuer-finanzsektor/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="18" data-aria-level="1"><a href="https://matproof.com/de/frameworks/dora"><span data-contrast="auto">https://matproof.com/de/frameworks/dora</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="19" data-aria-level="1"><a href="https://bexta.de/dora/ikt-assetmanagement-als-managed-service/"><span data-contrast="auto">https://bexta.de/dora/ikt-assetmanagement-als-managed-service/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="20" data-aria-level="1"><a href="https://www.fair-computer.de/whitepaper-success_stories/dora-compliance-asset-desk-fundament/"><span data-contrast="auto">https://www.fair-computer.de/whitepaper-success_stories/dora-compliance-asset-desk-fundament/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="21" data-aria-level="1"><a href="https://www.gleisslutz.com/de/aktuelles/know-how/dora-umfangreiche-compliance-pflichten-fuer-unternehmen-aus-dem-finanzsektor-beim-umgang-mit-ikt-risiken"><span data-contrast="auto">https://www.gleisslutz.com/de/aktuelles/know-how/dora-umfangreiche-compliance-pflichten-fuer-unternehmen-aus-dem-finanzsektor-beim-umgang-mit-ikt-risiken</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="22" data-aria-level="1"><a href="https://schulz-beratung.de/it-risiko-management-im-dora-zeitalter/"><span data-contrast="auto">https://schulz-beratung.de/it-risiko-management-im-dora-zeitalter/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="50" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="23" data-aria-level="1"><a href="https://www.fch-gruppe.de/Beitrag/23080/ikt-dienstleistungen-gemaess-dora-was-zaehlt-dazu-"><span data-contrast="auto">https://www.fch-gruppe.de/Beitrag/23080/ikt-dienstleistungen-gemaess-dora-was-zaehlt-dazu-</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-31c46f76 e-con-full e-flex e-con e-child" data-id="31c46f76" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-2ceda254 e-con-full e-flex e-con e-child" data-id="2ceda254" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-1bf12015 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation" data-id="1bf12015" data-element_type="widget" data-e-type="widget" data-widget_type="post-navigation.default">
				<div class="elementor-widget-container">
							<div class="elementor-post-navigation" role="navigation" aria-label="Post Navigation">
			<div class="elementor-post-navigation__prev elementor-post-navigation__link">
				<a href="https://bexta.de/dora-ikt-assetmanagement-als-managed-service/" rel="prev"><span class="post-navigation__arrow-wrapper post-navigation__arrow-prev"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-left" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z"></path></svg><span class="elementor-screen-only">Prev</span></span><span class="elementor-post-navigation__link__prev"><span class="post-navigation__prev--label"> Zuvor </span></span></a>			</div>
							<div class="elementor-post-navigation__separator-wrapper">
					<div class="elementor-post-navigation__separator"></div>
				</div>
						<div class="elementor-post-navigation__next elementor-post-navigation__link">
							</div>
		</div>
						</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p><a href="https://bexta.de/dora-ikt-kontrollfunktion-als-managed-service/">DORA IKT-Kontrollfunktion als Managed Service</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DORA IKT-Assetmanagement als Managed Service</title>
		<link>https://bexta.de/dora-ikt-assetmanagement-als-managed-service/</link>
		
		<dc:creator><![CDATA[Erdinc Bulat]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 11:31:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://bexta.de/?p=2714</guid>

					<description><![CDATA[<p>DORA ist kein „Nice‑to‑have“ – IKT‑Assetmanagement ist der Kern  Seit dem 17. Januar 2025 gilt die Digital Operational Resilience Act (DORA) als verbindlicher EU‑Standard für digitale Resilienz im Finanzsektor. Für Banken, Versicherungen und andere Finanzunternehmen ist DORA nicht nur ein neues Compliance‑Papier, sondern ein radikaler Hebel zur Verbesserung von Cybersicherheit, IT‑Governance und operativer Stabilität.[1][2][3]  Zentraler Baustein ist Artikel 8 DORA: das [&#8230;]</p>
<p><a href="https://bexta.de/dora-ikt-assetmanagement-als-managed-service/">DORA IKT-Assetmanagement als Managed Service</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2714" class="elementor elementor-2714" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-271d3292 e-flex e-con-boxed e-con e-parent" data-id="271d3292" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-6d364add elementor-widget elementor-widget-spacer" data-id="6d364add" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-716c7fd8 e-flex e-con-boxed e-con e-parent" data-id="716c7fd8" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-25cfbbf8 e-con-full e-flex e-con e-child" data-id="25cfbbf8" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-629b172f elementor-widget elementor-widget-post-info" data-id="629b172f" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-c11abe6 elementor-inline-item" itemprop="datePublished">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>11/04/2026</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-441d57a elementor-inline-item" itemprop="about">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<span class="elementor-post-info__terms-list-item">News</span>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-f922bd6 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="f922bd6" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">DORA IKT-Assetmanagement als Managed Service</h1>				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-3154a94c e-flex e-con-boxed e-con e-parent" data-id="3154a94c" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-3e4a450 e-con-full e-flex e-con e-child" data-id="3e4a450" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-d23ac7c elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image" data-id="d23ac7c" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-featured-image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="1184" height="864" src="https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915247504.webp" class="attachment-full size-full wp-image-2751" alt="" srcset="https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915247504.webp 1184w, https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915247504-300x219.webp 300w, https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915247504-1024x747.webp 1024w, https://bexta.de/wp-content/uploads/2026/04/visionary-ai-1775915247504-768x560.webp 768w" sizes="(max-width: 1184px) 100vw, 1184px" />															</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-54ece69a e-flex e-con-boxed e-con e-parent" data-id="54ece69a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-7ee56295 e-con-full e-flex e-con e-child" data-id="7ee56295" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-393b7a64 elementor-widget elementor-widget-text-editor" data-id="393b7a64" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b><span data-contrast="none">DORA ist kein „Nice‑to‑have“ – IKT‑Assetmanagement ist der Kern</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Seit dem 17. Januar 2025 gilt die </span><b><span data-contrast="none">Digital Operational Resilience Act (DORA)</span></b><span data-contrast="none"> als verbindlicher EU‑Standard für digitale Resilienz im Finanzsektor. Für Banken, Versicherungen und andere Finanzunternehmen ist DORA nicht nur ein neues Compliance‑Papier, sondern ein radikaler Hebel zur Verbesserung von Cybersicherheit, IT‑Governance und operativer Stabilität.</span><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Zentraler Baustein ist </span><b><span data-contrast="none">Artikel 8 DORA</span></b><span data-contrast="none">: das vollständige, risikoorientierte und aktuelle Inventar aller Informations‑ und IKT‑Assets, die Geschäfts‑ und kritische Funktionen unterstützen. Genau hier laufen viele Unternehmen heute noch in die Falle von </span><b><span data-contrast="none">Excel‑Listen, Silos und unvollständigen Daten</span></b><span data-contrast="none"> – und riskieren damit Compliance‑Lücken, Audit‑Kritik und massive Sanktionen.</span><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">In diesem Beitrag analysieren wir, was DORA für Ihr </span><b><span data-contrast="none">DORA‑konformes IKT‑Assetmanagement</span></b><span data-contrast="none"> wirklich fordert, zeigen empirische Daten zu Umsetzungsproblemen und positionieren Bexta als </span><b><span data-contrast="none">operativer Umsetzungspartner</span></b><span data-contrast="none"> für ein modernes, </span><b><span data-contrast="none">Managed‑Service‑basiertes DORA‑IKT‑Assetmanagement</span></b><span data-contrast="none"> im Finanzsektor.</span><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">Was DORA wirklich fordert: IKT‑Assetmanagement als Governance‑Baustein</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">DORA koppelt IKT‑Assetmanagement untrennbar an das </span><b><span data-contrast="none">umfassende ICT‑Risk‑Management‑Framework</span></b><span data-contrast="none"> (Artikel 5–16 sowie die zugehörigen Technical Standards). Für Ihr </span><b><span data-contrast="none">DORA‑IKT‑Assetmanagement</span></b><span data-contrast="none"> bedeutet das mehr als „nur“ eine Liste der Server und Lizenzen – es ist ein kontinuierlicher Prozess, der Risiko‑ und Governance‑Standards umsetzt.</span><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn8"><span data-contrast="auto">[8]</span></a><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol><li><b><span data-contrast="none"> Vollständiges IKT‑Assetinventar(Art. 8 DORA)</span></b></li></ol><p><span data-contrast="none">Artikel 8 DORA verlangt von Finanzunternehmen ein vollständiges Inventar aller Informations‑ und IKT‑Assets, die Geschäfts‑ oder kritische Funktionen unterstützen – insbesondere wenn sie als </span><b><span data-contrast="none">kritisch</span></b><span data-contrast="none"> klassifiziert sind. Dazu gehören:</span><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Hardware (Server, Storage, Endgeräte, Netzwerkkomponenten)</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Software und Applikationen (Core‑Banking‑Systeme, Policy‑Systeme, CRM, Middleware)</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Datenbestände und Datenbanken</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Cloud‑Infrastrukturen und Plattformen (IaaS, PaaS, SaaS)</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="none">Externe Standorte und Rechenzentren</span><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Die EBA und ESAs betonen, dass das Inventar </span><b><span data-contrast="none">eindeutige IDs, Verantwortliche, Standorte, Klassifizierungen und Verknüpfungen zu Geschäftsprozessen</span></b><span data-contrast="none"> enthalten muss.</span><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol start="2"><li><b><span data-contrast="none"> Klassifizierung nach Kritikalität und Risiko</span></b></li></ol><p><span data-contrast="none">DORA verlangt keine „beliebige“ Klassifizierung, sondern eine </span><b><span data-contrast="none">kritikalitätsbasierte Einordnung</span></b><span data-contrast="none"> nach den unterstützten Geschäfts‑ und kritischen Funktionen. Kritische Assets sind dabei:</span><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="27" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Systeme, deren Ausfall oder Kompromittierung die Weiterführung der Geschäfts‑ oder kritischen Funktionen erheblich beeinträchtigt.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="27" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Infrastrukturen mit direktem Zugriff auf Kundendaten oder regulatorische Meldesysteme.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Hier leiten EBA‑Richtlinien und ESAs‑Q&amp;As ab, dass die Klassifizierung </span><b><span data-contrast="none">Risiko‑, Verfügbarkeits‑ und Abhängigkeitskriterien</span></b><span data-contrast="none"> integrieren muss.</span><a href="bookmark://fn9"><span data-contrast="auto">[9]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol start="3"><li><b><span data-contrast="none"> Lifecycle‑Management und Veränderungsdokumentation</span></b></li></ol><p><span data-contrast="none">Gemäß Art. 8 Abs. 6 DORA muss das IKT‑Assetinventar </span><b><span data-contrast="none">ständig gepflegt</span></b><span data-contrast="none"> werden. Dazu gehört:</span><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="28" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Auf‑ und Abschaltung von Assets (Onboarding / Decommissioning)</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="28" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Änderungen der Konfiguration, Versionen und Roll‑Outs</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="28" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Dokumentation von Patches, End‑of‑Life‑Datums und Support‑Zeiträumen von Drittanbietern</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Organisationen müssen das Inventar </span><b><span data-contrast="none">mindestens jährlich oder bei jeder wesentlichen Änderung</span></b><span data-contrast="none"> überprüfen.</span><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol start="4"><li><b><span data-contrast="none"> Abhängigkeiten und Verknüpfung zu IT‑Service‑Management</span></b></li></ol><p><span data-contrast="none">DORA verlangt, dass kritische IKT‑Assets mit </span><b><span data-contrast="none">IT‑Service‑Management‑Systemen (z.B. CMDB), Business‑Continuity‑ und Risikomanagementprozessen</span></b><span data-contrast="none"> verknüpft sind. Konkret bedeutet das:</span><a href="bookmark://fn10"><span data-contrast="auto">[10]</span></a><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="29" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Verknüpfung von Assets zu Geschäfts‑ und kritischen Funktionen inkl. RTO/RPO.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="29" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Verknüpfung zu Vorfall‑Management‑Systemen (ICT‑Incident‑Reporting).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="29" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Verknüpfung zu Backup‑ und Restore‑Konzepten sowie Resilienz‑Tests.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="5"><li><b><span data-contrast="none"> Drittparteien‑Bezug und Auslagerungsregister</span></b></li></ol><p><span data-contrast="none">DORA verpflichtet Finanzunternehmen, IKT‑Drittparteien (inkl. Cloud‑Provider) systematisch zu erfassen und zu bewerten. Das IKT‑Assetinventar muss deshalb:</span><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="30" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Externe IKT‑Provider (Cloud, Hosting, Managed‑Services) als eigene Asset‑Kategorie führen.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="30" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Vertrags‑, Support‑ und Sub‑Kontoketten (Subcontracting) dokumentieren.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="30" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Verknüpfungen zum Drittparteien‑Register und zu den RTTS (Regulatory Technical Standards) aufweisen.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">Die Realität in Banken &amp; Versicherungen: Warum viele Unternehmen scheitern</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Trotz hoher Aufmerksamkeit bleibt die Umsetzung von DORA‑konformem </span><b><span data-contrast="none">IKT‑Assetmanagement</span></b><span data-contrast="none"> in vielen Banken und Versicherungen fragmentiert. Studien von Big‑4‑Beratungen und Marktanalysen zeigen ein klares Muster:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">KPMG‑Studie zu DORA‑Umsetzung (2025):</span></b><span data-contrast="none"> In einer Analyse von neun Banken und fünf Versicherungen in Deutschland hatte </span><b><span data-contrast="none">keine</span></b><span data-contrast="none"> der befragten Banken die DORA‑Vorgaben bis Januar 2025 vollständig erfüllt; Versicherungen starteten vielfach erst mit der Implementierung.</span><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Excel‑Lösungen und ad‑hoc‑Tabellen:</span></b><span data-contrast="none"> Viele Institute lösen die Meldungs‑ und Inventar‑Anforderungen zunächst über Excel‑Tabellen, weil Tool‑Einführungen für DORA‑Klassifizierung und Resilienz‑Reporting noch laufen.</span><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><b><span data-contrast="none">Typische Probleme</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="32" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Silos und fehlende Single‑Source‑of‑Truth:</span></b> <br /><span data-contrast="none">Assets verteilen sich über verschiedene Geschäftsbereiche, Infrastruktur‑Teams und Cloud‑Abteilungen. Ohne ein zentrales Inventar entstehen doppelte, veraltete oder inkonsistente Daten.</span><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="32" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Fehlende Kritikalitäts‑ und Risikobewertung:</span></b> <br /><span data-contrast="none">Viele Unternehmen führen nur technische Inventare („was läuft?“), nicht aber die </span><b><span data-contrast="none">Risiko‑ und Geschäfts‑Kontexte</span></b><span data-contrast="none"> („warum ist das kritisch?“).</span><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="32" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Manuelle Prozesse statt Automatisierung:</span></b> <br /><span data-contrast="none">Regelmäßige Überprüfungen, Patches, Cloud‑Ressourcen‑Änderungen und Drittparteien‑Updates werden manuell nachgetragen – mit hohem Fehler‑ und Verzögerungspotenzial.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Das Ergebnis ist kein „DORA‑konformes IKT‑Assetinventar“, sondern ein </span><b><span data-contrast="none">Patchwork aus Halbfertigkeiten</span></b><span data-contrast="none"> – und damit ein klarer Risikofaktor für Aufsicht und Audit.</span><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">Daten &amp; Studien: IT‑Komplexität, Cloud‑Nutzung und Audit‑Risiken</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Um die Dringlichkeit von professionellem </span><b><span data-contrast="none">DORA‑konformem IKT‑Assetmanagement</span></b><span data-contrast="none"> zu verstehen, hilft ein Blick auf aktuelle Kennzahlen und Benchmarks:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">DORA‑Scope:</span></b><span data-contrast="none"> DORA gilt für rund </span><b><span data-contrast="none">22.000 Finanzunternehmen</span></b><span data-contrast="none"> in der EU, darunter Banken, Versicherungen, Zahlungsdienstleister und kritische ICT‑Drittanbieter.</span><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Cloud‑Penetration im Finanzsektor:</span></b><span data-contrast="none"> Branchenstudien schätzen, dass bereits über </span><b><span data-contrast="none">60–70% der EU‑Banken</span></b><span data-contrast="none"> relevante Workloads in der Cloud betreiben; die gleiche Richtung gilt für Versicherungen.</span><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Audit‑ und Review‑Ergebnisse:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">KPMG und andere Beratungen berichten, dass bei &gt;50% der DORA‑Reviews noch </span><b><span data-contrast="none">Lücken im IKT‑Assetinventar</span></b><span data-contrast="none"> diagnostiziert werden, insbesondere bei Cloud‑ und Drittparteien‑Assets.</span><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">Häufige Kritikpunkte: fehlende Klassifizierung nach Kritikalität, unvollständige Verknüpfung zu Business‑Funktionen und inkonsistente Daten zwischen CMDB, ISMS und BCM.</span><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Modellrechnungen zeigen: Je größer das Geschäfts‑Volumen eines Instituts, desto höher ist im Falle einer DORA‑Sanktion nicht nur die </span><b><span data-contrast="none">Geldstrafe</span></b><span data-contrast="none">, sondern auch das </span><b><span data-contrast="none">reputational und regulatorische Risiko</span></b><span data-contrast="none">, einschließlich möglicher Betriebs‑Einschränkungen.</span><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><a href="bookmark://fn13"><span data-contrast="auto">[13]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">Risiken bei Nicht‑Umsetzung von DORA‑IKT‑Assetmanagement</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Ein unvollständiges oder inkonsistent gepflegtes IKT‑Assetinventar ist kein „softes“ Thema – es provoziert konkrete Risiken auf drei Ebenen:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol><li><b><span data-contrast="none"> Regulatorische und haftungsrechtliche Risiken</span></b></li></ol><p><span data-contrast="none">DORA verpflichtet Finanzunternehmen zur </span><b><span data-contrast="none">Vollständigkeit, Aktualität und Konsistenz</span></b><span data-contrast="none"> ihres IKT‑Assetinventars sowie zur Einbindung in das ICT‑Risk‑Management‑Framework.</span><a href="bookmark://fn1"><span data-contrast="auto">[1]</span></a><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="34" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Sanktionen:</span></b><span data-contrast="none"> Nationalen Aufsichtsbehörden (z.B. BaFin in Deutschland) stehen umfangreiche Instrumente zur Verfügung: öffentliche Rüge, Anordnungen, Geldstrafen und im Extremfall Entzug der Lizenz.</span><a href="bookmark://fn14"><span data-contrast="auto">[14]</span></a><a href="bookmark://fn15"><span data-contrast="auto">[15]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="34" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Geldstrafen:</span></b><span data-contrast="none"> Je nach nationaler Implementierung können Sanktionen bis zu </span><b><span data-contrast="none">5% des Jahresumsatzes</span></b><span data-contrast="none"> oder </span><b><span data-contrast="none">10 Mio. €</span></b><span data-contrast="none"> betragen; bei Personen in Führungspositionen sind bis zu </span><b><span data-contrast="none">5 Mio. €</span></b><span data-contrast="none"> möglich.</span><a href="bookmark://fn14"><span data-contrast="auto">[14]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="2"><li><b><span data-contrast="none"> Operative Risiken</span></b></li></ol><p><span data-contrast="none">Ohne ein vollständiges IKT‑Assetinventar sind:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Incident‑Response‑Zeiten</span></b><span data-contrast="none"> länger, weil kritische Systeme schwer zu lokalisieren sind.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Risiko‑ und Back‑out‑Pläne</span></b><span data-contrast="none"> unvollständig, da Abhängigkeiten und Umfeld nicht transparent sind.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Change‑ und Roll‑out‑Prozesse</span></b><span data-contrast="none"> riskanter, weil „vergessene“ Assets bei Patch‑ oder Upgrade‑Szenarien nicht mitgedacht werden.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="3"><li><b><span data-contrast="none"> Finanzielle und reputationsbezogene Risiken</span></b></li></ol><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Kosten indirekter Non‑Compliance:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Mehraufwand in Audits, Tests und Nacharbeit.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">Opportunity‑Costs durch umfangreiche Selbst‑Excel‑Lösungen statt skalierbarer, automatisierter Plattformen.</span><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Reputations‑ und Kundentreue‑Risiko:</span></b> <br /><span data-contrast="none">Öffentliche Sanktionen oder wiederholte Audit‑Mängel können das Vertrauen von Kunden und Partnerbanken erheblich schädigen.</span><a href="bookmark://fn13"><span data-contrast="auto">[13]</span></a><a href="bookmark://fn12"><span data-contrast="auto">[12]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">Wie modernes, DORA‑konformes IKT‑Assetmanagement aussieht</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Ein reines „Statisch‑Excel‑Register“ reicht nicht, um DORA‑Anforderungen wirklich zu erfüllen. Ein modernes </span><b><span data-contrast="none">IKT‑Assetmanagement‑Framework</span></b><span data-contrast="none"> zeichnet sich durch drei Merkmale aus:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol><li><b><span data-contrast="none">Kontinuierlichstatt statisch</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ol><p><span data-contrast="none">Die Welt ist dynamisch:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="37" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Cloud‑Ressourcen werden angelegt und gelöscht.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="37" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Container‑Pools werden skaliert.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="37" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Patches werden automatisch verteilt.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Ein DORA‑konformes IKT‑Assetmanagement ist </span><b><span data-contrast="none">integriert in Orchestrierungs‑, Deployment‑ und Monitoring‑Pipelines</span></b><span data-contrast="none"> und aktualisiert sein Inventar automatisiert – nicht nur „vierteljährlich mit Excel“.</span><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ol start="2"><li><b><span data-contrast="none"> Risikobasiert statt rein technisch</span></b></li></ol><p><span data-contrast="none">Das Inventar ist kein technisches Verzeichnis, sondern ein </span><b><span data-contrast="none">Risikofokus‑Tool</span></b><span data-contrast="none">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="38" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Jedes Asset ist mit einem </span><b><span data-contrast="none">kritikalitäts‑Score</span></b><span data-contrast="none"> und einem </span><b><span data-contrast="none">Ausfall‑ / Kompromittierungs‑Impact</span></b><span data-contrast="none"> verknüpft.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="38" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Risiko‑Metriken fließen in Dashboards für C‑Suite, CRO und CISO.</span><a href="bookmark://fn2"><span data-contrast="auto">[2]</span></a><a href="bookmark://fn11"><span data-contrast="auto">[11]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ol start="3"><li><b><span data-contrast="none"> Prozess‑ undGovernance‑integriert</span></b></li></ol><p><span data-contrast="none">Ein vollwertiges IKT‑Assetinventar ist:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Anbindung an CMDB / Service‑Desk‑Systeme</span></b><span data-contrast="none">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Anbindung an ISMS / GRC‑Plattformen</span></b><span data-contrast="none">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Anbindung an BCM‑ und Resilienz‑Test‑Konzepte</span></b><span data-contrast="none"> sowie</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">Anbindung an Incident‑ und Reporting‑Workflows</span></b><span data-contrast="none">.</span><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">Managed Service als Lösung: Perspektivwechsel beim DORA‑IKT‑Assetmanagement</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Viele Banken und Versicherungen stehen vor derselben Frage:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">„Sollen wir eine eigene Plattform kaufen und aufbauen – oder ein DORA‑konformes IKT‑Assetmanagement als Managed Service beziehen?“</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:630,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Der Managed‑Service‑Ansatz bietet entscheidende Vorteile:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="40" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Kontinuität:</span></b><span data-contrast="none"> Ein externer Partner betreibt das Inventar dauerhaft; nicht nur während eines Beratungsprojekts.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="40" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Skalierbarkeit:</span></b><span data-contrast="none"> Zentrale Plattformen und Prozesse können mit Wachstum, Fusionen oder Cloud‑Migrationen skaliert werden.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="40" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Operative Entlastung:</span></b><span data-contrast="none"> Interne IT‑Teams können sich auf Core‑Banking‑ und Produktthemen konzentrieren, nicht auf Spreadsheet‑Pflege.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-contrast="none">Für DORA‑relevantes </span><b><span data-contrast="none">IKT‑Assetinventar</span></b><span data-contrast="none"> bedeutet dies:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Dauerhafte Inventarisierung</span></b><span data-contrast="none"> von Assets aller Art,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Regelmäßige Klassifizierung und Risiko‑Bewertung</span></b><span data-contrast="none">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Automatisierte Abstimmung mit Cloud‑, DevOps‑ und Security‑Ökosystem</span></b><span data-contrast="none">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:105,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></li></ul><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">Bexta GmbH – operativer Umsetzungspartner für DORA‑konformes IKT‑Assetmanagement</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">Bexta GmbH positioniert sich nicht als klassische Beratung, sondern als </span><b><span data-contrast="none">operativer Umsetzungspartner</span></b><span data-contrast="none"> für DORA‑konformes IKT‑Assetmanagement im Finanzsektor. Das Ziel ist klar: Sie erhalten kein Papier‑Konzept, sondern eine </span><b><span data-contrast="none">lauffähige, audit‑ready IKT‑Assetmanagement‑Lösung</span></b><span data-contrast="none"> auf Basis eines strukturierten Managed Services.</span><a href="bookmark://fn3"><span data-contrast="auto">[3]</span></a><a href="bookmark://fn5"><span data-contrast="auto">[5]</span></a><a href="bookmark://fn7"><span data-contrast="auto">[7]</span></a><a href="bookmark://fn6"><span data-contrast="auto">[6]</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><b><span data-contrast="none">IKT‑Assetmanagement als Managed Service (DORA‑konform)</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:-30,&quot;335559738&quot;:315,&quot;335559739&quot;:105,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">DORA verpflichtet Finanzunternehmen zu einem </span><b><span data-contrast="none">vollständigen, risikoorientierten und aktuellen IKT‑Assetinventar</span></b><span data-contrast="none"> sowie zu dessen Einbindung in IT‑Risk‑Management und Business‑Continuity‑Prozesse. [</span><a href="bookmark://fn4"><span data-contrast="auto">[4]</span></a> <br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></p><p><span data-contrast="none">⁂</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559740&quot;:360}"> </span></p><p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:210,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><a href="https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en"><span data-contrast="auto">https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en</span></a><span data-contrast="none">       </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><a href="https://www.fluxforce.ai/blog/dora-compliance-for-banks-7-ict-risk-requirements-to-meet-now"><span data-contrast="auto">https://www.fluxforce.ai/blog/dora-compliance-for-banks-7-ict-risk-requirements-to-meet-now</span></a><span data-contrast="none">          </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><a href="https://youattest.com/blog/the-digital-operational-resilience-act-dora-in-germany-a-key-to-strengthening-financial-sector-resilience/"><span data-contrast="auto">https://youattest.com/blog/the-digital-operational-resilience-act-dora-in-germany-a-key-to-strengthening-financial-sector-resilience/</span></a><span data-contrast="none">    </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><a href="https://digitale-operationale-resilienz.de/inventar-aller-kritischen-informations-und-ikt-assets/"><span data-contrast="auto">https://digitale-operationale-resilienz.de/inventar-aller-kritischen-informations-und-ikt-assets/</span></a><span data-contrast="none">        </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><a href="https://klardenker.kpmg.de/financialservices-hub/dora-2025-herausforderungen-und-naechste-schritte/"><span data-contrast="auto">https://klardenker.kpmg.de/financialservices-hub/dora-2025-herausforderungen-und-naechste-schritte/</span></a><span data-contrast="none">        </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="6" data-aria-level="1"><a href="https://simplifylabs.io/dora-compliance-strategies-2025/"><span data-contrast="auto">https://simplifylabs.io/dora-compliance-strategies-2025/</span></a><span data-contrast="none">              </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="7" data-aria-level="1"><a href="https://trilio.io/resources/dora-compliance/"><span data-contrast="auto">https://trilio.io/resources/dora-compliance/</span></a><span data-contrast="none">             </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="8" data-aria-level="1"><a href="https://copla.com/blog/compliance-regulations/dora-regulations-in-germany/"><span data-contrast="auto">https://copla.com/blog/compliance-regulations/dora-regulations-in-germany/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="9" data-aria-level="1"><a href="https://www.eba.europa.eu/publications-and-media/press-releases/eba-amends-its-guidelines-ict-and-security-risk-management-measures-context-dora-application"><span data-contrast="auto">https://www.eba.europa.eu/publications-and-media/press-releases/eba-amends-its-guidelines-ict-and-security-risk-management-measures-context-dora-application</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="10" data-aria-level="1"><a href="https://www.forum-verlag.com/fachwissen/datenschutz-und-it-sicherheit/digital-operational-resilience-act/"><span data-contrast="auto">https://www.forum-verlag.com/fachwissen/datenschutz-und-it-sicherheit/digital-operational-resilience-act/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="11" data-aria-level="1"><a href="https://www.dechert.com/knowledge/onpoint/2024/3/exploring-dora-s-ict-risk-requirements--key-issues-for-asset-man.html"><span data-contrast="auto">https://www.dechert.com/knowledge/onpoint/2024/3/exploring-dora-s-ict-risk-requirements&#8211;key-issues-for-asset-man.html</span></a><span data-contrast="none">   </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="12" data-aria-level="1"><a href="https://matproof.com/de/frameworks/dora"><span data-contrast="auto">https://matproof.com/de/frameworks/dora</span></a><span data-contrast="none">    </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="13" data-aria-level="1"><a href="https://www.regulation-dora.eu/banking"><span data-contrast="auto">https://www.regulation-dora.eu/banking</span></a><span data-contrast="none">  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="14" data-aria-level="1"><a href="https://redintogreen.pl/en/consequences-of-non-compliance-with-the-dora-regulation/"><span data-contrast="auto">https://redintogreen.pl/en/consequences-of-non-compliance-with-the-dora-regulation/</span></a><span data-contrast="none">  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="15" data-aria-level="1"><a href="https://www.simmons-simmons.com/en/publications/cm60fpyud06qktr0k9h3ch8vg/dora-implementation-day-is-here"><span data-contrast="auto">https://www.simmons-simmons.com/en/publications/cm60fpyud06qktr0k9h3ch8vg/dora-implementation-day-is-here</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="16" data-aria-level="1"><a href="https://www.linkedin.com/pulse/how-implement-asset-management-according-requirements-peter-h%C3%B8j-ocenf"><span data-contrast="auto">https://www.linkedin.com/pulse/how-implement-asset-management-according-requirements-peter-høj-ocenf</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="17" data-aria-level="1"><a href="https://grc-docs.com/blogs/digital-operational-resilience-act-dora/case-studies-and-best-practices-of-dora"><span data-contrast="auto">https://grc-docs.com/blogs/digital-operational-resilience-act-dora/case-studies-and-best-practices-of-dora</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="18" data-aria-level="1"><a href="https://www.alation.com/blog/dora-compliance-strategies-finance/"><span data-contrast="auto">https://www.alation.com/blog/dora-compliance-strategies-finance/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="19" data-aria-level="1"><a href="https://apollon-security.com/pages/dora-digital-operational-resilience-act"><span data-contrast="auto">https://apollon-security.com/pages/dora-digital-operational-resilience-act</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:540,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="20" data-aria-level="1"><a href="https://phoenix.security/dora-implementation/"><span data-contrast="auto">https://phoenix.security/dora-implementation/</span></a><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:210,&quot;335559740&quot;:360}"> </span></li></ol>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6085b6fb e-con-full e-flex e-con e-child" data-id="6085b6fb" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-48b0d9bd e-con-full e-flex e-con e-child" data-id="48b0d9bd" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6c191d6f elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation" data-id="6c191d6f" data-element_type="widget" data-e-type="widget" data-widget_type="post-navigation.default">
				<div class="elementor-widget-container">
							<div class="elementor-post-navigation" role="navigation" aria-label="Post Navigation">
			<div class="elementor-post-navigation__prev elementor-post-navigation__link">
				<a href="https://bexta.de/die-stille-dora-pflicht-die-2026-ueber-pruefungen-entscheidet/" rel="prev"><span class="post-navigation__arrow-wrapper post-navigation__arrow-prev"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-left" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z"></path></svg><span class="elementor-screen-only">Prev</span></span><span class="elementor-post-navigation__link__prev"><span class="post-navigation__prev--label"> Zuvor </span></span></a>			</div>
							<div class="elementor-post-navigation__separator-wrapper">
					<div class="elementor-post-navigation__separator"></div>
				</div>
						<div class="elementor-post-navigation__next elementor-post-navigation__link">
				<a href="https://bexta.de/dora-ikt-kontrollfunktion-als-managed-service/" rel="next"><span class="elementor-post-navigation__link__next"><span class="post-navigation__next--label">Nächster </span></span><span class="post-navigation__arrow-wrapper post-navigation__arrow-next"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg><span class="elementor-screen-only">Next</span></span></a>			</div>
		</div>
						</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p><a href="https://bexta.de/dora-ikt-assetmanagement-als-managed-service/">DORA IKT-Assetmanagement als Managed Service</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Die stille DORA-Pflicht, die 2026 über Prüfungen entscheidet</title>
		<link>https://bexta.de/die-stille-dora-pflicht-die-2026-ueber-pruefungen-entscheidet/</link>
		
		<dc:creator><![CDATA[Erdinc Bulat]]></dc:creator>
		<pubDate>Sun, 28 Dec 2025 14:07:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://bexta.de/?p=2562</guid>

					<description><![CDATA[<p>Warum IKT-Assetmanagement unter DORA unterschätzt wird  Viele Finanzunternehmen verbinden DORA vor allem mit Incidents, Tests oder Drittparteien. Dabei liegt eine der prüfungsrelevantesten Pflichten oft im Hintergrund:  👉 Ein vollständiges, aktuelles und risikoorientiertes IKT-Assetinventar.  Ab 2026 wird genau dieses Inventar zur Grundlage fast aller DORA-Prüfungen.  DORA macht IKT-Assets zu regulatorischen Objekten  Unter DORA sind IKT-Assets nicht mehr nur IT-Thema, sondern:  Bestandteil [&#8230;]</p>
<p><a href="https://bexta.de/die-stille-dora-pflicht-die-2026-ueber-pruefungen-entscheidet/">Die stille DORA-Pflicht, die 2026 über Prüfungen entscheidet</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2562" class="elementor elementor-2562" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-21faa8ab e-flex e-con-boxed e-con e-parent" data-id="21faa8ab" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-3a40191c elementor-widget elementor-widget-spacer" data-id="3a40191c" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-39ad9e49 e-flex e-con-boxed e-con e-parent" data-id="39ad9e49" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5db58657 e-con-full e-flex e-con e-child" data-id="5db58657" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-2a58c458 elementor-widget elementor-widget-post-info" data-id="2a58c458" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-c11abe6 elementor-inline-item" itemprop="datePublished">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>28/12/2025</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-441d57a elementor-inline-item" itemprop="about">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<span class="elementor-post-info__terms-list-item">News</span>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-2850b572 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="2850b572" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Die stille DORA-Pflicht, die 2026 über Prüfungen entscheidet</h1>				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-a9f2a6c e-flex e-con-boxed e-con e-parent" data-id="a9f2a6c" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-468bc156 e-con-full e-flex e-con e-child" data-id="468bc156" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-4316796d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image" data-id="4316796d" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-featured-image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="1344" height="768" src="https://bexta.de/wp-content/uploads/2025/12/site-vision-asset-4.webp" class="attachment-full size-full wp-image-2604" alt="" srcset="https://bexta.de/wp-content/uploads/2025/12/site-vision-asset-4.webp 1344w, https://bexta.de/wp-content/uploads/2025/12/site-vision-asset-4-300x171.webp 300w, https://bexta.de/wp-content/uploads/2025/12/site-vision-asset-4-1024x585.webp 1024w, https://bexta.de/wp-content/uploads/2025/12/site-vision-asset-4-768x439.webp 768w" sizes="(max-width: 1344px) 100vw, 1344px" />															</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-629050eb e-flex e-con-boxed e-con e-parent" data-id="629050eb" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-77bbfeaa e-con-full e-flex e-con e-child" data-id="77bbfeaa" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-14da5476 elementor-widget elementor-widget-text-editor" data-id="14da5476" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h2><span data-contrast="auto">Warum IKT-Assetmanagement unter DORA unterschätzt wird</span><span data-ccp-props="{}"> </span></h2><p><span data-contrast="auto">Viele Finanzunternehmen verbinden DORA vor allem mit Incidents, Tests oder Drittparteien.</span> <br /><span data-contrast="auto">Dabei liegt eine der prüfungsrelevantesten Pflichten oft im Hintergrund:</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">👉</span><span data-contrast="auto"> Ein vollständiges, aktuelles und risikoorientiertes IKT-Assetinventar.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Ab 2026 wird genau dieses Inventar zur Grundlage fast aller DORA-Prüfungen.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">DORA macht IKT-Assets zu regulatorischen Objekten</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Unter DORA sind IKT-Assets nicht mehr nur IT-Thema, sondern:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Bestandteil des IKT-Risikomanagements</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Grundlage für Impact-Analysen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Ausgangspunkt für Incident-Bewertungen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Basis für Drittparteien- und Auslagerungsregister</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Prüfungsobjekt für Aufsichtsbehörden</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Unvollständige oder veraltete Assetlisten sind kein Detailproblem mehr – sie sind ein Compliance-Risiko.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Warum klassisches Assetmanagement nicht ausreicht</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Typische Schwachstellen im Markt:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Excel-Listen ohne Aktualität</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">fehlende Klassifizierung nach Kritikalität</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">keine Verbindung zu Risiken oder Incidents</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Cloud- und SaaS-Assets unvollständig erfasst</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Drittparteien nicht sauber integriert</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Ab 2026 werden diese Lücken sichtbar und angreifbar.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">IKT-Assetmanagement als Managed Service – der neue Standard</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Best Practice entwickelt sich klar in Richtung kontinuierlicher Managed Service.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Ein DORA-konformes Assetmanagement umfasst:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Vollständige Inventarisierung aller IKT-Assets</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Klassifizierung nach Kritikalität und Schutzbedarf</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Lifecycle-Management (Onboarding bis Decommissioning)</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Verknüpfung mit Risiken, Incidents und Prozessen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Integration von IKT-Drittdienstleistern</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="6" data-aria-level="1"><span data-contrast="auto">Regelmäßige Reports und Audit-Nachweise</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Was Bexta konkret übernimmt</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Bexta betreibt Ihr IKT-Assetmanagement dauerhaft und prüfungsfest:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Aufbau und Pflege eines vollständigen Assetinventars</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Kontinuierliche Aktualisierung und Qualitätskontrolle</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Risiko- und Abhängigkeitsbewertungen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Unterstützung bei Impact- und Resilienzanalysen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Audit-fähige Dokumentation für Aufsicht und Prüfer</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Ergebnis:</span> <br /><span data-contrast="auto">Transparenz, Sicherheit und regulatorische Ruhe.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Warum jetzt der richtige Zeitpunkt ist</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Ende 2025 bietet eine seltene Situation:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">DORA ist in Kraft</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Prüfungsintensität steigt ab 2026</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Aufsichten erwarten Reife, nicht Aufbau</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Unternehmen, die jetzt auf einen Managed Service setzen:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">vermeiden hektische Nachbesserungen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">reduzieren Prüfungsfeststellungen</span><span data-ccp-props="{}"> </span></li><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">entlasten interne Teams nachhaltig</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Fazit: Assetmanagement entscheidet über DORA-Erfolg</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">IKT-Assetmanagement ist keine technische Pflichtübung.</span> <br /><span data-contrast="auto">Es ist das Fundament digitaler Resilienz unter DORA.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Bexta bietet IKT-Assetmanagement als Managed Service ab Januar 2026 an.</span> <br /><span data-contrast="auto">Jetzt ist der richtige Zeitpunkt, diesen Schritt strategisch vorzubereiten.</span><span data-ccp-props="{}"> </span></p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5a89333f e-con-full e-flex e-con e-child" data-id="5a89333f" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-44ea96ad e-con-full e-flex e-con e-child" data-id="44ea96ad" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-75bbfdc5 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation" data-id="75bbfdc5" data-element_type="widget" data-e-type="widget" data-widget_type="post-navigation.default">
				<div class="elementor-widget-container">
							<div class="elementor-post-navigation" role="navigation" aria-label="Post Navigation">
			<div class="elementor-post-navigation__prev elementor-post-navigation__link">
				<a href="https://bexta.de/warum-finanzunternehmen-jetzt-handeln-muessen-und-warum-januar-2026-der-entscheidende-zeitpunkt-ist/" rel="prev"><span class="post-navigation__arrow-wrapper post-navigation__arrow-prev"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-left" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z"></path></svg><span class="elementor-screen-only">Prev</span></span><span class="elementor-post-navigation__link__prev"><span class="post-navigation__prev--label"> Zuvor </span></span></a>			</div>
							<div class="elementor-post-navigation__separator-wrapper">
					<div class="elementor-post-navigation__separator"></div>
				</div>
						<div class="elementor-post-navigation__next elementor-post-navigation__link">
				<a href="https://bexta.de/dora-ikt-assetmanagement-als-managed-service/" rel="next"><span class="elementor-post-navigation__link__next"><span class="post-navigation__next--label">Nächster </span></span><span class="post-navigation__arrow-wrapper post-navigation__arrow-next"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg><span class="elementor-screen-only">Next</span></span></a>			</div>
		</div>
						</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p><a href="https://bexta.de/die-stille-dora-pflicht-die-2026-ueber-pruefungen-entscheidet/">Die stille DORA-Pflicht, die 2026 über Prüfungen entscheidet</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Warum Finanzunternehmen jetzt handeln müssen – und warum Januar 2026 der entscheidende Zeitpunkt ist</title>
		<link>https://bexta.de/warum-finanzunternehmen-jetzt-handeln-muessen-und-warum-januar-2026-der-entscheidende-zeitpunkt-ist/</link>
		
		<dc:creator><![CDATA[Erdinc Bulat]]></dc:creator>
		<pubDate>Sun, 28 Dec 2025 14:04:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://bexta.de/?p=2551</guid>

					<description><![CDATA[<p>Mit dem Digital Operational Resilience Act (DORA) verändert sich die Rolle der IKT-Kontrollfunktion grundlegend. Was bislang häufig intern, projektbezogen oder nebenbei organisiert wurde, wird ab 2025/2026 zu einer dauerhaften, unabhängigen und prüfungsrelevanten Kernfunktion.  Die entscheidende Entwicklung: 👉 Die Auslagerung der IKT-Kontrollfunktion ist unter DORA ausdrücklich zulässig – und regulatorisch sinnvoll.  Für Finanzunternehmen ergibt sich jetzt, Ende 2025, eine einmalige strategische [&#8230;]</p>
<p><a href="https://bexta.de/warum-finanzunternehmen-jetzt-handeln-muessen-und-warum-januar-2026-der-entscheidende-zeitpunkt-ist/">Warum Finanzunternehmen jetzt handeln müssen – und warum Januar 2026 der entscheidende Zeitpunkt ist</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2551" class="elementor elementor-2551" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-4518c4a4 e-flex e-con-boxed e-con e-parent" data-id="4518c4a4" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-53a63f10 elementor-widget elementor-widget-spacer" data-id="53a63f10" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-55ff014 e-flex e-con-boxed e-con e-parent" data-id="55ff014" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-2f7453fe e-con-full e-flex e-con e-child" data-id="2f7453fe" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-60ffc857 elementor-widget elementor-widget-post-info" data-id="60ffc857" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-c11abe6 elementor-inline-item" itemprop="datePublished">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>28/12/2025</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-441d57a elementor-inline-item" itemprop="about">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<span class="elementor-post-info__terms-list-item">News</span>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-51235300 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="51235300" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Warum Finanzunternehmen jetzt handeln müssen – und warum Januar 2026 der entscheidende Zeitpunkt ist</h1>				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-24f3cb9e e-flex e-con-boxed e-con e-parent" data-id="24f3cb9e" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-2162d052 e-con-full e-flex e-con e-child" data-id="2162d052" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-2ec612eb elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image" data-id="2ec612eb" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-featured-image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1536" height="1024" src="https://bexta.de/wp-content/uploads/2025/08/Adsiz-tasarim-44.webp" class="attachment-full size-full wp-image-2092" alt="" srcset="https://bexta.de/wp-content/uploads/2025/08/Adsiz-tasarim-44.webp 1536w, https://bexta.de/wp-content/uploads/2025/08/Adsiz-tasarim-44-300x200.webp 300w, https://bexta.de/wp-content/uploads/2025/08/Adsiz-tasarim-44-1024x683.webp 1024w, https://bexta.de/wp-content/uploads/2025/08/Adsiz-tasarim-44-768x512.webp 768w" sizes="(max-width: 1536px) 100vw, 1536px" />															</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-615939d0 e-flex e-con-boxed e-con e-parent" data-id="615939d0" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-7aa8481e e-con-full e-flex e-con e-child" data-id="7aa8481e" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3e6f8fa5 elementor-widget elementor-widget-text-editor" data-id="3e6f8fa5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span data-contrast="auto">Mit dem Digital Operational Resilience Act (DORA) verändert sich die Rolle der IKT-Kontrollfunktion grundlegend.</span> <br /><span data-contrast="auto">Was bislang häufig intern, projektbezogen oder nebenbei organisiert wurde, wird ab 2025/2026 zu einer dauerhaften, unabhängigen und prüfungsrelevanten Kernfunktion.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Die entscheidende Entwicklung:</span> <br /><span data-contrast="auto">👉</span><span data-contrast="auto"> Die Auslagerung der IKT-Kontrollfunktion ist unter DORA ausdrücklich zulässig – und regulatorisch sinnvoll.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Für Finanzunternehmen ergibt sich jetzt, Ende 2025, eine einmalige strategische Chance.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Warum die IKT-Kontrollfunktion unter DORA nicht mehr „nebenbei“ funktioniert</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">DORA verlangt eine IKT-Kontrollfunktion, die:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">unabhängig von der operativen IT agiert</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">kontinuierlich (nicht projektbezogen) arbeitet</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">die Wirksamkeit von Kontrollen überprüft</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Risiken, Incidents und Maßnahmen objektiv bewertet</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">gegenüber Aufsicht und Prüfern belastbar argumentiert</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Die Realität im Markt:</span> <br /><span data-contrast="auto">Viele Institute stehen vor mindestens einem dieser Probleme:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Personalmangel mit echter DORA-Expertise</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">fehlende organisatorische Unabhängigkeit</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Wissenssilos zwischen IT, Risk, Compliance und Management</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">hoher Prüfungsdruck ohne operative Entlastung</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Warum Auslagerung ab 2026 Best Practice wird</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Ab Januar 2026 werden Aufsichtsprüfungen zunehmend reife, gelebte Prozesse erwarten – keine Konzepte mehr.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Die Auslagerung der IKT-Kontrollfunktion bietet dabei klare Vorteile:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Unabhängigkeit per Design</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Zugriff auf spezialisiertes DORA-Know-how</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Planbare Kosten statt Personalaufbau</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Sofortige Prüfungsfähigkeit</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Entlastung von IT, Compliance und Management</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Best Practice im Finanzsektor:</span> <br /><span data-contrast="auto">Die IKT-Kontrollfunktion wird als Managed Service betrieben – vergleichbar mit Interner Revision oder Auslagerungsmanagement.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Was „IKT-Kontrollfunktion als Managed Service“ bei Bexta bedeutet</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Bexta übernimmt die IKT-Kontrollfunktion nicht beratend, sondern operativ.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Dazu gehören unter anderem:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Überwachung der DORA-IKT-Governance</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Regelmäßige Wirksamkeitsprüfungen von Kontrollen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Unabhängige Bewertung von IKT-Risiken und Incidents</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Nachweisführung gegenüber Aufsicht und Prüfern</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Regelmäßiges Reporting an Management &amp; Vorstand</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="6" data-aria-level="1"><span data-contrast="auto">Enge Verzahnung mit Asset-, Risiko- und Auslagerungsmanagement</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Wichtig:</span> <br /><span data-contrast="auto">Die Verantwortung bleibt im Institut – die operative Durchführung liegt bei Bexta.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Warum jetzt handeln – und nicht erst 2026?</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Ende 2025 ist der letzte strategisch sinnvolle Zeitpunkt, um:</span><span data-ccp-props="{}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Auslagerungen sauber zu strukturieren</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Übergangsphasen ohne Prüfungsstress zu gestalten</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Dienstleister bewusst auszuwählen</span><span data-ccp-props="{}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Prozesse gemeinsam aufzusetzen</span><span data-ccp-props="{}"> </span></li></ul><p><span data-contrast="auto">Ab 2026 wird es zunehmend um Nachweise, nicht mehr um Aufbau gehen.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">👉</span><span data-contrast="auto"> Wer jetzt handelt, verschafft sich regulatorische Ruhe.</span> <br /><span data-contrast="auto">👉</span><span data-contrast="auto"> Wer wartet, reagiert unter Druck.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Fazit: Eine bewusste Entscheidung für Resilienz</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Die Auslagerung der IKT-Kontrollfunktion ist keine Schwäche –</span> <br /><span data-contrast="auto">sie ist ein Zeichen von Reife, Professionalität und Weitsicht.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Bexta bietet diesen Managed Service ab Januar 2026 an.</span> <br /><span data-contrast="auto">Die Vorbereitung beginnt jetzt.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Jetzt ist der richtige Moment für ein erstes Gespräch.</span><span data-ccp-props="{}"> </span></p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-43677066 e-con-full e-flex e-con e-child" data-id="43677066" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-4fb6abed e-con-full e-flex e-con e-child" data-id="4fb6abed" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-8b685c5 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation" data-id="8b685c5" data-element_type="widget" data-e-type="widget" data-widget_type="post-navigation.default">
				<div class="elementor-widget-container">
							<div class="elementor-post-navigation" role="navigation" aria-label="Post Navigation">
			<div class="elementor-post-navigation__prev elementor-post-navigation__link">
				<a href="https://bexta.de/dora-und-drittanbieter-so-sichern-sie-ihre-lieferkette-ab/" rel="prev"><span class="post-navigation__arrow-wrapper post-navigation__arrow-prev"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-left" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z"></path></svg><span class="elementor-screen-only">Prev</span></span><span class="elementor-post-navigation__link__prev"><span class="post-navigation__prev--label"> Zuvor </span></span></a>			</div>
							<div class="elementor-post-navigation__separator-wrapper">
					<div class="elementor-post-navigation__separator"></div>
				</div>
						<div class="elementor-post-navigation__next elementor-post-navigation__link">
				<a href="https://bexta.de/die-stille-dora-pflicht-die-2026-ueber-pruefungen-entscheidet/" rel="next"><span class="elementor-post-navigation__link__next"><span class="post-navigation__next--label">Nächster </span></span><span class="post-navigation__arrow-wrapper post-navigation__arrow-next"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg><span class="elementor-screen-only">Next</span></span></a>			</div>
		</div>
						</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p><a href="https://bexta.de/warum-finanzunternehmen-jetzt-handeln-muessen-und-warum-januar-2026-der-entscheidende-zeitpunkt-ist/">Warum Finanzunternehmen jetzt handeln müssen – und warum Januar 2026 der entscheidende Zeitpunkt ist</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bexta auf dem Cybersecurity Summit 2025 in Hamburg</title>
		<link>https://bexta.de/bexta-auf-dem-cybersecurity-summit-2025-in-hamburg-insights-innovationen-und-it-sicherheitsstrategien-der-zukunft/</link>
		
		<dc:creator><![CDATA[Erdinc Bulat]]></dc:creator>
		<pubDate>Sun, 18 May 2025 19:35:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://bexta.de/?p=1092</guid>

					<description><![CDATA[<p>Bexta auf dem Cybersecurity Summit 2025 in Hamburg – Insights, Innovationen und IT-Sicherheitsstrategien der Zukunft Die Bexta GmbH war am 14. und 15. Mai 2025 auf dem renommierten Cybersecurity Summit 2025 in Hamburg vertreten – einer der führenden Fachveranstaltungen für IT-Sicherheit in Deutschland. Mit über 1.200 Teilnehmenden und mehr als 100 Ausstellern drehte sich an [&#8230;]</p>
<p><a href="https://bexta.de/bexta-auf-dem-cybersecurity-summit-2025-in-hamburg-insights-innovationen-und-it-sicherheitsstrategien-der-zukunft/">Bexta auf dem Cybersecurity Summit 2025 in Hamburg</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1092" class="elementor elementor-1092" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-2ae8e051 e-flex e-con-boxed e-con e-parent" data-id="2ae8e051" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-45cdd60b elementor-widget elementor-widget-spacer" data-id="45cdd60b" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-2ed50165 e-flex e-con-boxed e-con e-parent" data-id="2ed50165" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-4701784f e-con-full e-flex e-con e-child" data-id="4701784f" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7f382f81 elementor-widget elementor-widget-post-info" data-id="7f382f81" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-c11abe6 elementor-inline-item" itemprop="datePublished">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>18/05/2025</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-441d57a elementor-inline-item" itemprop="about">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<span class="elementor-post-info__terms-list-item">News</span>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-7d0dac63 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="7d0dac63" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Bexta auf dem Cybersecurity Summit 2025 in Hamburg</h1>				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-4486d8b9 e-flex e-con-boxed e-con e-parent" data-id="4486d8b9" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-26962a2e e-con-full e-flex e-con e-child" data-id="26962a2e" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-49d3a66c elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image" data-id="49d3a66c" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-featured-image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1920" height="1024" src="https://bexta.de/wp-content/uploads/2025/05/7-3.webp" class="attachment-full size-full wp-image-1207" alt="" srcset="https://bexta.de/wp-content/uploads/2025/05/7-3.webp 1920w, https://bexta.de/wp-content/uploads/2025/05/7-3-300x160.webp 300w, https://bexta.de/wp-content/uploads/2025/05/7-3-1024x546.webp 1024w, https://bexta.de/wp-content/uploads/2025/05/7-3-768x410.webp 768w, https://bexta.de/wp-content/uploads/2025/05/7-3-1536x819.webp 1536w" sizes="(max-width: 1920px) 100vw, 1920px" />															</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-6825ebc7 e-flex e-con-boxed e-con e-parent" data-id="6825ebc7" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-63e7e5c4 e-con-full e-flex e-con e-child" data-id="63e7e5c4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-50153e5 elementor-widget elementor-widget-text-editor" data-id="50153e5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b>Bexta auf dem Cybersecurity Summit 2025 in Hamburg – Insights, Innovationen und IT-Sicherheitsstrategien der Zukunft</b></p><p><span style="font-weight: 400;">Die Bexta GmbH war am 14. und 15. Mai 2025 auf dem renommierten </span><b>Cybersecurity Summit 2025 in Hamburg</b><span style="font-weight: 400;"> vertreten – einer der führenden Fachveranstaltungen für </span><b>IT-Sicherheit in Deutschland</b><span style="font-weight: 400;">. Mit über 1.200 Teilnehmenden und mehr als 100 Ausstellern drehte sich an zwei Tagen alles um </span><b>Cybersecurity-Trends</b><span style="font-weight: 400;">, </span><b>NIS2-Compliance</b><span style="font-weight: 400;">, </span><b>Ransomware-Prävention</b><span style="font-weight: 400;"> und </span><b>künstliche Intelligenz in der IT-Sicherheit</b><span style="font-weight: 400;">.</span></p><p><b>Cybersecurity-Trends &amp; NIS2: Worauf sich Unternehmen 2025 einstellen müssen</b></p><p><span style="font-weight: 400;">Besondere Aufmerksamkeit erhielt die Session zur bevorstehenden </span><b>NIS2-Richtlinie</b><span style="font-weight: 400;">, die den Stellenwert von Cybersicherheit in Unternehmen weiter erhöht. Für IT-Verantwortliche bedeutet das: Sicherheitsstrategien müssen überdacht und auf Management-Ebene verankert werden – ein zentrales Thema auch für unsere Kundenprojekte bei Bexta.</span></p><p><b>Zero Trust &amp; KI: Moderne Sicherheitsstrategien im Fokus</b></p><p><span style="font-weight: 400;">Großen Mehrwert boten praxisnahe Vorträge zu </span><b>Zero-Trust-Architekturen</b><span style="font-weight: 400;"> und </span><b>Ransomware-Abwehr</b><span style="font-weight: 400;">. Ebenso spannend: Die Rolle von </span><b>künstlicher Intelligenz in der Cyberabwehr</b><span style="font-weight: 400;"> – von Machine Learning zur Echtzeiterkennung von Bedrohungen bis hin zu automatisierten Abwehrmaßnahmen. Hier zeigt sich, wie Mensch und KI zukünftig noch enger zusammenarbeiten werden.</span></p><p><b>Networking in Hamburg: Austausch mit CISOs, Start-ups und Security-Profis</b></p><p><span style="font-weight: 400;">Neben dem Fachprogramm nutzte unser Team die Gelegenheit zum gezielten Networking – unter anderem mit CISOs großer Unternehmen, innovativen IT-Start-ups und Branchenkolleg*innen. Die perfekt organisierte Summit-App erleichterte es, gezielt Kontakte zu knüpfen und das Programm effizient zu planen.</span></p><p><b>Fazit: Neue Impulse für unsere IT-Security-Projekte</b></p><p><span style="font-weight: 400;">Der </span><b>Cybersecurity Summit 2025</b><span style="font-weight: 400;"> war für Bexta eine wertvolle Plattform, um aktuelle Entwicklungen live zu erleben und das eigene Know-how zu erweitern. Wir kehren mit konkreten Handlungsempfehlungen, neuen Partnerschaften und frischer Motivation zurück. Die gewonnenen Erkenntnisse fließen direkt in unsere Beratungs- und Sicherheitsprojekte ein.</span></p><p><b>Bexta – Wir schützen, was zählt.</b></p><p><i><span style="font-weight: 400;">#CybersecuritySummit2025 #ITSicherheit #NIS2 #ZeroTrust #Ransomware #KünstlicheIntelligenz #ITSecurityHamburg #BextaGmbH #CybersecurityEvents #NetworkingIT</span></i></p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-31bed2e6 e-con-full e-flex e-con e-child" data-id="31bed2e6" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-46c7ef0b e-con-full e-flex e-con e-child" data-id="46c7ef0b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-68698227 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation" data-id="68698227" data-element_type="widget" data-e-type="widget" data-widget_type="post-navigation.default">
				<div class="elementor-widget-container">
							<div class="elementor-post-navigation" role="navigation" aria-label="Post Navigation">
			<div class="elementor-post-navigation__prev elementor-post-navigation__link">
				<a href="https://bexta.de/dora-2025-der-druck-steigt-finanzbranche-sucht-orientierung/" rel="prev"><span class="post-navigation__arrow-wrapper post-navigation__arrow-prev"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-left" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z"></path></svg><span class="elementor-screen-only">Prev</span></span><span class="elementor-post-navigation__link__prev"><span class="post-navigation__prev--label"> Zuvor </span></span></a>			</div>
							<div class="elementor-post-navigation__separator-wrapper">
					<div class="elementor-post-navigation__separator"></div>
				</div>
						<div class="elementor-post-navigation__next elementor-post-navigation__link">
				<a href="https://bexta.de/zero-trust-ist-keine-option-mehr-sondern-grundlage-moderner-it-sicherheit/" rel="next"><span class="elementor-post-navigation__link__next"><span class="post-navigation__next--label">Nächster </span></span><span class="post-navigation__arrow-wrapper post-navigation__arrow-next"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg><span class="elementor-screen-only">Next</span></span></a>			</div>
		</div>
						</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p><a href="https://bexta.de/bexta-auf-dem-cybersecurity-summit-2025-in-hamburg-insights-innovationen-und-it-sicherheitsstrategien-der-zukunft/">Bexta auf dem Cybersecurity Summit 2025 in Hamburg</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DORA 2025: Der Druck steigt – Finanzbranche sucht Orientierung</title>
		<link>https://bexta.de/dora-2025-der-druck-steigt-finanzbranche-sucht-orientierung/</link>
		
		<dc:creator><![CDATA[Erdinc Bulat]]></dc:creator>
		<pubDate>Sun, 18 May 2025 19:33:04 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://bexta.de/?p=1086</guid>

					<description><![CDATA[<p>DORA 2025: Der Druck steigt – Finanzbranche sucht Orientierung Seit dem 17. Januar 2025 ist DORA in Kraft. Doch viele Finanzunternehmen stehen vor offenen Fragen, unklaren Vorgaben und wachsendem Umsetzungsdruck. Was jetzt zählt – und wie man die digitale Resilienz strategisch stärkt. Mit dem Inkrafttreten des Digital Operational Resilience Act (DORA) am 17. Januar 2025 [&#8230;]</p>
<p><a href="https://bexta.de/dora-2025-der-druck-steigt-finanzbranche-sucht-orientierung/">DORA 2025: Der Druck steigt – Finanzbranche sucht Orientierung</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1086" class="elementor elementor-1086" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-40fec895 e-flex e-con-boxed e-con e-parent" data-id="40fec895" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-18856f67 elementor-widget elementor-widget-spacer" data-id="18856f67" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-2a345681 e-flex e-con-boxed e-con e-parent" data-id="2a345681" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-74d8131d e-con-full e-flex e-con e-child" data-id="74d8131d" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5162b18d elementor-widget elementor-widget-post-info" data-id="5162b18d" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-c11abe6 elementor-inline-item" itemprop="datePublished">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>18/05/2025</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-441d57a elementor-inline-item" itemprop="about">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<span class="elementor-post-info__terms-list-item">News</span>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-782098c9 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="782098c9" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">DORA 2025: Der Druck steigt – Finanzbranche sucht Orientierung</h1>				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-3c392796 e-flex e-con-boxed e-con e-parent" data-id="3c392796" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-27b25d78 e-con-full e-flex e-con e-child" data-id="27b25d78" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7efdfe6b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image" data-id="7efdfe6b" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-featured-image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1920" height="1024" src="https://bexta.de/wp-content/uploads/2025/05/8.webp" class="attachment-full size-full wp-image-1205" alt="" srcset="https://bexta.de/wp-content/uploads/2025/05/8.webp 1920w, https://bexta.de/wp-content/uploads/2025/05/8-300x160.webp 300w, https://bexta.de/wp-content/uploads/2025/05/8-1024x546.webp 1024w, https://bexta.de/wp-content/uploads/2025/05/8-768x410.webp 768w, https://bexta.de/wp-content/uploads/2025/05/8-1536x819.webp 1536w" sizes="(max-width: 1920px) 100vw, 1920px" />															</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-18bd7332 e-flex e-con-boxed e-con e-parent" data-id="18bd7332" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-d22e22a e-con-full e-flex e-con e-child" data-id="d22e22a" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-78a6e5bf elementor-widget elementor-widget-text-editor" data-id="78a6e5bf" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h2><b>DORA 2025: Der Druck steigt – Finanzbranche sucht Orientierung</b></h2><p><span style="font-weight: 400;">Seit dem 17. Januar 2025 ist DORA in Kraft. Doch viele Finanzunternehmen stehen vor offenen Fragen, unklaren Vorgaben und wachsendem Umsetzungsdruck. Was jetzt zählt – und wie man die digitale Resilienz strategisch stärkt.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">Mit dem Inkrafttreten des Digital Operational Resilience Act (DORA) am 17. Januar 2025 hat die EU einen einheitlichen Rechtsrahmen geschaffen, um die digitale Widerstandsfähigkeit von Finanzunternehmen zu stärken. DORA gilt für nahezu alle Akteure der Branche: Banken, Versicherungen, Kapitalverwaltungsgesellschaften, Zahlungsdienstleister, Krypto-Anbieter – und auch deren IT-Dienstleister.</span></p><h2><b>Aktueller Stand: Umsetzung in der Praxis bleibt herausfordernd</b></h2><p><span style="font-weight: 400;">Obwohl DORA seit Januar 2025 gilt, haben viele Finanzunternehmen die Umsetzung noch nicht vollständig abgeschlossen. Eine Untersuchung von KPMG zeigt, dass keine der befragten Banken die DORA-Vorgaben bis Januar 2025 vollständig erfüllt hatte. Insbesondere die Anpassung von Verträgen mit IT-Dienstleistern und die Implementierung von Resilienz-Tests stellen Herausforderungen dar.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">Zudem sind einige technische Details und Templates, wie z.B. für das Informationsregister, erst kurz vor oder nach dem Stichtag veröffentlicht worden. Dies hat zu Verzögerungen und Unsicherheiten in der Umsetzung geführt.</span></p><h2><b>Die fünf Säulen von DORA – und was sie bedeuten</b></h2><p><span style="font-weight: 400;">DORA basiert auf fünf zentralen Säulen, die die digitale Resilienz von Finanzunternehmen stärken sollen:</span></p><ol><li><span style="font-weight: 400;"> IKT-Risikomanagement: Einführung eines umfassenden Rahmens zur Identifikation, Bewertung und Steuerung von IKT-Risiken.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">2. Behandlung von IKT-bezogenen Vorfällen: Einrichtung von Prozessen zur Erkennung, Klassifizierung und Meldung von IKT-bezogenen Vorfällen.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">3. Digitale operationale Resilienztests: Regelmäßige Tests, einschließlich Threat-Led Penetration Testing, zur Überprüfung der Widerstandsfähigkeit gegenüber IKT-Störungen.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">4. Management von IKT-Drittparteirisiken: Strenge Anforderungen an Verträge mit IT-Dienstleistern und Überwachung kritischer Drittanbieter.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">5. Informationsaustausch: Förderung des freiwilligen Austauschs von Informationen über Cyberbedrohungen und -vorfälle zwischen Finanzunternehmen.</span></li></ol><h2><b>Häufige Stolpersteine – und wie man sie vermeidet</b></h2><p><span style="font-weight: 400;">Die Umsetzung von DORA bringt verschiedene Herausforderungen mit sich:</span></p><p><span style="font-weight: 400;">&#8211; Vertragsmanagement: Schwierigkeiten bei der Anpassung bestehender IT-Dienstleisterverträge.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Meldepflichten: Komplexe Fristen und Anforderungen für die Meldung von Vorfällen.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Ressourcenmangel: Kleinere Institute haben oft nicht die Kapazitäten oder das Fachwissen.</span></p><h2><b>Handlungsempfehlungen für Finanzunternehmen</b></h2><p><span style="font-weight: 400;">Um den Anforderungen von DORA gerecht zu werden, sollten Finanzunternehmen folgende Schritte in Betracht ziehen:</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">1. Gap-Analyse durchführen</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">2. Vertragsprüfung</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">3. Schulungen und Sensibilisierung</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">4. Implementierung von Meldeprozessen</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">5. Zusammenarbeit mit Experten</span></p><h2><b>Unterstützung durch Bexta GmbH</b></h2><p><span style="font-weight: 400;">Die Bexta GmbH bietet umfassende Unterstützung bei der Umsetzung der DORA-Anforderungen:</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Beratung zur Identifikation und Schließung von Compliance-Lücken</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Maßgeschneiderte Schulungen</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Unterstützung bei der Prozessoptimierung</span></p><p><span style="font-weight: 400;">Jetzt kostenfreies Erstgespräch vereinbaren: [Kontaktformular]</span></p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5fbdbe54 e-con-full e-flex e-con e-child" data-id="5fbdbe54" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-5be6a49c e-con-full e-flex e-con e-child" data-id="5be6a49c" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5b51f0b7 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation" data-id="5b51f0b7" data-element_type="widget" data-e-type="widget" data-widget_type="post-navigation.default">
				<div class="elementor-widget-container">
							<div class="elementor-post-navigation" role="navigation" aria-label="Post Navigation">
			<div class="elementor-post-navigation__prev elementor-post-navigation__link">
				<a href="https://bexta.de/nis/" rel="prev"><span class="post-navigation__arrow-wrapper post-navigation__arrow-prev"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-left" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z"></path></svg><span class="elementor-screen-only">Prev</span></span><span class="elementor-post-navigation__link__prev"><span class="post-navigation__prev--label"> Zuvor </span></span></a>			</div>
							<div class="elementor-post-navigation__separator-wrapper">
					<div class="elementor-post-navigation__separator"></div>
				</div>
						<div class="elementor-post-navigation__next elementor-post-navigation__link">
				<a href="https://bexta.de/bexta-auf-dem-cybersecurity-summit-2025-in-hamburg-insights-innovationen-und-it-sicherheitsstrategien-der-zukunft/" rel="next"><span class="elementor-post-navigation__link__next"><span class="post-navigation__next--label">Nächster </span></span><span class="post-navigation__arrow-wrapper post-navigation__arrow-next"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg><span class="elementor-screen-only">Next</span></span></a>			</div>
		</div>
						</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p><a href="https://bexta.de/dora-2025-der-druck-steigt-finanzbranche-sucht-orientierung/">DORA 2025: Der Druck steigt – Finanzbranche sucht Orientierung</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NIS</title>
		<link>https://bexta.de/nis/</link>
		
		<dc:creator><![CDATA[Erdinc Bulat]]></dc:creator>
		<pubDate>Sun, 18 May 2025 19:30:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://bexta.de/?p=1072</guid>

					<description><![CDATA[<p>NIS2: Warum die EU-Cybersicherheitsrichtlinie erneut verschoben wurde – und was jetzt auf Unternehmen zukommt Die NIS2-Richtlinie (Network and Information Security Directive 2) ist die Weiterentwicklung der 2016 in Kraft getretenen NIS-Richtlinie. Sie soll Cybersicherheit in Europa harmonisieren, kritische Infrastrukturen besser schützen und eine Meldepflicht bei Sicherheitsvorfällen einführen. Der geplante Umsetzungszeitpunkt in nationales Recht war der [&#8230;]</p>
<p><a href="https://bexta.de/nis/">NIS</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1072" class="elementor elementor-1072" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-72b62713 e-flex e-con-boxed e-con e-parent" data-id="72b62713" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-861b9a2 elementor-widget elementor-widget-spacer" data-id="861b9a2" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-761bc2b0 e-flex e-con-boxed e-con e-parent" data-id="761bc2b0" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-63060237 e-con-full e-flex e-con e-child" data-id="63060237" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-e33bff2 elementor-widget elementor-widget-post-info" data-id="e33bff2" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-c11abe6 elementor-inline-item" itemprop="datePublished">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>18/05/2025</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-441d57a elementor-inline-item" itemprop="about">
													<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<span class="elementor-post-info__terms-list-item">News</span>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-2a9a2ad4 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="2a9a2ad4" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">NIS</h1>				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-17fbd6f7 e-flex e-con-boxed e-con e-parent" data-id="17fbd6f7" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-115d7f85 e-con-full e-flex e-con e-child" data-id="115d7f85" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-3ea9e1d5 elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image" data-id="3ea9e1d5" data-element_type="widget" data-e-type="widget" data-widget_type="theme-post-featured-image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1920" height="1024" src="https://bexta.de/wp-content/uploads/2025/05/9.webp" class="attachment-full size-full wp-image-1204" alt="" srcset="https://bexta.de/wp-content/uploads/2025/05/9.webp 1920w, https://bexta.de/wp-content/uploads/2025/05/9-300x160.webp 300w, https://bexta.de/wp-content/uploads/2025/05/9-1024x546.webp 1024w, https://bexta.de/wp-content/uploads/2025/05/9-768x410.webp 768w, https://bexta.de/wp-content/uploads/2025/05/9-1536x819.webp 1536w" sizes="(max-width: 1920px) 100vw, 1920px" />															</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-2160e3a0 e-flex e-con-boxed e-con e-parent" data-id="2160e3a0" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-4aa3af27 e-con-full e-flex e-con e-child" data-id="4aa3af27" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5e4d86f elementor-widget elementor-widget-text-editor" data-id="5e4d86f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h1><b>NIS2: Warum die EU-Cybersicherheitsrichtlinie erneut verschoben wurde – und was jetzt auf Unternehmen zukommt</b></h1><p><span style="font-weight: 400;">Die NIS2-Richtlinie (Network and Information Security Directive 2) ist die Weiterentwicklung der 2016 in Kraft getretenen NIS-Richtlinie. Sie soll Cybersicherheit in Europa harmonisieren, kritische Infrastrukturen besser schützen und eine Meldepflicht bei Sicherheitsvorfällen einführen. Der geplante Umsetzungszeitpunkt in nationales Recht war der 17. Oktober 2024 – doch nun ist klar: Viele EU-Mitgliedstaaten, darunter auch Deutschland, sind deutlich im Verzug.</span></p><h2><b>Status quo: Die Umsetzung wackelt – trotz klarer Fristen</b></h2><p><span style="font-weight: 400;">Obwohl die EU den Mitgliedstaaten eine Frist bis Oktober 2024 gesetzt hat, zeigt ein aktueller Blick in den Gesetzgebungsprozess: Deutschland hat die nationale Umsetzung noch nicht finalisiert. Der Entwurf für das NIS2-Umsetzungsgesetz liegt zwar vor, doch es fehlt an konkreten Durchführungsregelungen, Ansprechstellen und Klarheit für betroffene Unternehmen.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">Viele Unternehmen fragen sich: Gilt NIS2 nun schon – oder nicht?</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">Aktueller Stand (Mai 2025):</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Die EU-Richtlinie ist formell in Kraft, aber nationale Gesetze fehlen oder sind noch in der Diskussion.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; In Deutschland wird mit einer Umsetzung frühestens Mitte/Ende 2025 gerechnet.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Unternehmen aus den Bereichen IT-Dienstleistungen, Energie, Gesundheit, Transport, Wasser, Verwaltung und Finanzsektor müssen sich dennoch jetzt vorbereiten.</span></p><h2><b>Was erwartet Unternehmen konkret?</b></h2><p><span style="font-weight: 400;">Auch wenn die Umsetzung auf sich warten lässt – NIS2 wird kommen. Und die Anforderungen sind deutlich strenger als bei der Vorgängerrichtlinie:</span></p><p><span style="font-weight: 400;">&#8211; Cybersicherheitsmaßnahmen nach dem Stand der Technik</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Risikobasierte Managementprozesse</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Meldepflichten innerhalb von 24 Stunden</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Haftung der Geschäftsleitung bei Verstößen</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">&#8211; Starke Bußgelder bei Nicht-Compliance (bis zu 10 Mio. Euro oder 2 % des weltweiten Umsatzes)</span></p><h2><b>Unsere Einschätzung: Was IT-Verantwortliche jetzt tun sollten</b></h2><p><span style="font-weight: 400;">Auch wenn der gesetzliche Druck noch fehlt, raten wir von Bexta GmbH zu folgendem Vorgehen:</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">1. Gap-Analyse nach NIS2-Standards durchführen</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">2. Sicherheitskonzepte und Notfallhandbücher aktualisieren</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">3. Meldeprozesse und Incident Response etablieren</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">4. C-Level Management für Cybersicherheitsrisiken sensibilisieren</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">5. Kontinuierliches Monitoring und regelmäßige Audits planen</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">Unser Team berät individuell zu den praktischen Auswirkungen von NIS2 und hilft dabei, die IT-Sicherheit strukturiert und nachhaltig zu verbessern.</span></p><h2><b>Fazit: Jetzt handeln – bevor es zu spät ist</b></h2><p><span style="font-weight: 400;">Auch wenn NIS2 (noch) nicht durch nationales Recht verpflichtend ist: Die Richtlinie ist ein Weckruf für mehr Cyberresilienz. Wer heute vorbereitet ist, vermeidet morgen Bußgelder, Reputationsschäden und operative Ausfälle. Wir unterstützen Sie dabei – praxisnah, rechtskonform und zukunftssicher.</span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;"><br /></span><span style="font-weight: 400;">Jetzt kostenfreies Erstgespräch vereinbaren: [Contact us] – Wir helfen Unternehmen aus dem Mittelstand, NIS2 konform umzusetzen.</span></p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1953194 e-con-full e-flex e-con e-child" data-id="1953194" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-68799256 e-con-full e-flex e-con e-child" data-id="68799256" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-16c1d662 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation" data-id="16c1d662" data-element_type="widget" data-e-type="widget" data-widget_type="post-navigation.default">
				<div class="elementor-widget-container">
							<div class="elementor-post-navigation" role="navigation" aria-label="Post Navigation">
			<div class="elementor-post-navigation__prev elementor-post-navigation__link">
							</div>
							<div class="elementor-post-navigation__separator-wrapper">
					<div class="elementor-post-navigation__separator"></div>
				</div>
						<div class="elementor-post-navigation__next elementor-post-navigation__link">
				<a href="https://bexta.de/dora-2025-der-druck-steigt-finanzbranche-sucht-orientierung/" rel="next"><span class="elementor-post-navigation__link__next"><span class="post-navigation__next--label">Nächster </span></span><span class="post-navigation__arrow-wrapper post-navigation__arrow-next"><svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg><span class="elementor-screen-only">Next</span></span></a>			</div>
		</div>
						</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p><a href="https://bexta.de/nis/">NIS</a> yazısı ilk önce <a href="https://bexta.de">Bexta</a> üzerinde ortaya çıktı.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
