{"id":182675,"date":"2025-05-12T06:50:14","date_gmt":"2025-05-12T10:50:14","guid":{"rendered":"https:\/\/innowise.com\/?p=182675"},"modified":"2025-12-18T05:47:18","modified_gmt":"2025-12-18T10:47:18","slug":"what-is-dora-compliance","status":"publish","type":"post","link":"https:\/\/innowise.com\/pt\/blog\/what-is-dora-compliance\/","title":{"rendered":"Navegar no DORA: o regulamento da UE para a resili\u00eancia digital no sector financeiro"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"182675\" class=\"elementor elementor-182675\">\n\t\t\t\t<div class=\"elementor-element elementor-element-819836f e-flex e-con-boxed e-con e-parent\" data-id=\"819836f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-475732b elementor-widget__width-initial elementor-widget elementor-widget-html\" data-id=\"475732b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div style=\"display: none;\">The power of data mapping in healthcare: benefits, use cases & future trends. As the healthcare industry and its supporting technologies rapidly expand, an immense amount of data and information is generated. Statistics show that about 30% of the world's data volume is attributed to the healthcare industry, with a projected growth rate of nearly 36% by 2025. This indicates that the growth rate is far beyond that of other industries such as manufacturing, financial services, and media and entertainment.<\/div>\n\n<div class=\"breadcrumbs flex\">\n    <div class=\"info\"> \n    <a href=\"https:\/\/innowise.com\/\">\n  Main\n  <\/a>\n    <\/div>\n    <div class=\"info\">\n         <a href=\"https:\/\/innowise.com\/about-us\/\">\n  About us\n  <\/a>\n    <\/div>\n     <div class=\"info\">\n          <a href=\"https:\/\/innowise.com\/blog\/\">\n  Blog\n  <\/a>\n    <\/div>\n<\/div>\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\/\", \n  \"@type\": \"BreadcrumbList\", \n  \"itemListElement\": [{\n    \"@type\": \"ListItem\", \n    \"position\": 1, \n    \"name\": \"Innowise is on Top: We Are No. 554 on Inc. 5000 Annual List\",\n    \"item\": \"https:\/\/innowise.com\/blog\/inc-5000-puts-innowise-group-among-the-fastest-growing-technology-companies-in-the-usa-2022\/\"  \n  },{\n    \"@type\": \"ListItem\", \n    \"position\": 2, \n    \"name\": \"Blog\",\n    \"item\": \"https:\/\/innowise.com\/blog\/\"  \n  },{\n    \"@type\": \"ListItem\", \n    \"position\": 3, \n    \"name\": \"Main\",\n    \"item\": \"https:\/\/innowise.com\/\"  \n  }]\n}\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93f634e elementor-widget-tablet__width-inherit elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"93f634e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Navigating DORA: the EU regulation for digital resilience in finance<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0ba38f elementor-widget__width-initial elementor-widget elementor-widget-html\" data-id=\"a0ba38f\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"heroBottom\">\n<div>    \n <a href=\"https:\/\/innowise.com\/authors\/siarhei-sukhadolski\/\">\n    Siarhei Sukhadolski \n    <\/a>\n<\/div> \n\n<div class=\"second\">    \n<span>May 12, 2025<\/span>\n<span>10 min read<\/span>  \n<\/div>  \n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b399fb9 elementor-hidden-desktop elementor-hidden-tablet e-flex e-con-boxed e-con e-parent\" data-id=\"b399fb9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-523b86d elementor-widget elementor-widget-image\" data-id=\"523b86d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover-Navigating-DORA_-the-EU-regulation-for-digital-resilience-in-finance.jpg\" class=\"attachment-large size-large wp-image-182677\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover-Navigating-DORA_-the-EU-regulation-for-digital-resilience-in-finance.jpg 880w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover-Navigating-DORA_-the-EU-regulation-for-digital-resilience-in-finance-300x225.jpg 300w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover-Navigating-DORA_-the-EU-regulation-for-digital-resilience-in-finance-768x576.jpg 768w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover-Navigating-DORA_-the-EU-regulation-for-digital-resilience-in-finance-16x12.jpg 16w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-970be0b article-description e-flex e-con-boxed e-con e-parent\" data-id=\"970be0b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f2465c0 author-article e-con-full e-flex e-con e-child\" data-id=\"f2465c0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0569738 e-con-full e-flex e-con e-child\" data-id=\"0569738\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5be36f0 elementor-widget elementor-widget-text-editor\" data-id=\"5be36f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Since its enforcement, the Digital Operational Resilience Act (DORA) has become a defining force in how the financial sector addresses ICT risk, security, and third-party dependencies. While the DORA meaning is clear in theory \u2014 a unified framework to strengthen digital resilience \u2014 applying it across systems, vendors, and operations still leaves many institutions navigating uncertainty.<\/p><p>This isn\u2019t just another DORA regulation summary. You already understand the stakes. The real question is: Are your systems, partners, and internal controls truly aligned with the DORA framework, and what\u2019s your strategy for long-term, sustainable compliance?<\/p><p>So, grab a seat \u2014 I\u2019ll walk you through what DORA really expects from your business, and more importantly, how to meet those expectations without slowing down.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e64314b e-con-full e-flex e-con e-child\" data-id=\"e64314b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a99b2ed elementor-widget elementor-widget-heading\" data-id=\"a99b2ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DORA framework and the push for unified digital risk governance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b868c elementor-widget elementor-widget-text-editor\" data-id=\"28b868c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DORA, formally known as <a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2022\/2554\/oj\">Regulation (EU) 2022\/2554<\/a>, is a binding EU regulation that came into force on 16 January 2023 and became applicable on 17 January 2025. Its launch wasn\u2019t a theoretical move. It was a direct response to escalating cyber threats in the financial sector. As financial institutions increasingly rely on cloud infrastructure, SaaS platforms, and other external partners to deliver digital services, they\u2019ve also become more vulnerable to interconnected risks that are difficult to predict, contain, and recover from.<\/p><p>The numbers speak for themselves: in 2024, the average cost of a data breach in finance hit <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">$6.08 million<\/a>, which is <b>22% higher<\/b> than the global average of <b>$4.88 million<\/b> across all industries.<\/p><p>Real-world incidents have only reinforced the need for stronger resilience. In 2018, TSB attempted a major core banking platform migration. Poor risk management, inadequate testing, and ineffective incident handling led to widespread outages, locking thousands of customers out of their accounts. As a result, regulators fined <a href=\"https:\/\/www.fca.org.uk\/news\/press-releases\/tsb-fined-48m-operational-resilience-failings\">TSB \u00a348.65 million<\/a> for operational risk and governance failures.<\/p><p>Similarly, in 2019, <a>Capital One suffered a massive breach<\/a> due to a misconfigured firewall in its cloud infrastructure, exposing data from over 100 million customers. The aftermath included <b>$80 million in penalties and major remediation costs.<\/b><\/p><p>The issues didn\u2019t stop there. The <a href=\"https:\/\/www.bbc.com\/news\/articles\/cpe3zgznwjno\">CrowdStrike outage<\/a> in July 2024 made the interconnectedness of digital infrastructure painfully obvious. Triggered by a faulty update, it rippled across critical systems \u2014 grounding flights, freezing banking operations, and halting professional services. It wasn\u2019t just a tech glitch; it was a full-scale business continuity crisis, demonstrating how third-party ICT failures can carry systemic consequences.<\/p><p>So, DORA emerged as the EU\u2019s answer: a comprehensive, enforceable regulation built to close the digital resilience gap with clear accountability, harmonized standards, and a framework suited for today\u2019s interconnected economy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1977028 elementor-widget elementor-widget-image\" data-id=\"1977028\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"354\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-timeline-of-DORA-standards-implementation-1.png\" class=\"attachment-large size-large wp-image-182681\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-timeline-of-DORA-standards-implementation-1.png 1000w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-timeline-of-DORA-standards-implementation-1-300x133.png 300w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-timeline-of-DORA-standards-implementation-1-768x340.png 768w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-timeline-of-DORA-standards-implementation-1-18x8.png 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ae5feb e-con-full e-flex e-con e-child\" data-id=\"7ae5feb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-224db6c elementor-widget elementor-widget-heading\" data-id=\"224db6c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why DORA compliance is now a business-critical priority\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9882278 elementor-widget elementor-widget-text-editor\" data-id=\"9882278\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Think of it this way: cybersecurity used to be something you checked off with annual audits, some incident playbooks, and a handful of siloed policies tucked into IT\u2019s corner. But with DORA, that model is no longer good enough. Now, DORA security is everyone&#8217;s responsibility \u2014 from engineers to executives.<\/p><p>It\u2019s not just about proving you had a firewall \u2014 it\u2019s about proving your entire digital supply chain can take a hit and keep running. DORA brings cybersecurity out of the shadows and into the boardroom, forcing companies to treat digital risk like a business-critical issue, not just a technical one.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53db8fd elementor-widget elementor-widget-image\" data-id=\"53db8fd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"375\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Infographic-explaining-the-DORA-framework.png\" class=\"attachment-full size-full wp-image-182682\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Infographic-explaining-the-DORA-framework.png 1000w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Infographic-explaining-the-DORA-framework-300x113.png 300w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Infographic-explaining-the-DORA-framework-768x288.png 768w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Infographic-explaining-the-DORA-framework-18x7.png 18w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-84a793f e-con-full e-flex e-con e-child\" data-id=\"84a793f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-82a4a75 e-con-full e-flex e-con e-child\" data-id=\"82a4a75\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e31f61c elementor-widget elementor-widget-heading\" data-id=\"e31f61c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Who must comply?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55e6121 elementor-widget elementor-widget-text-editor\" data-id=\"55e6121\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The DORA EU regulation applies to more than 20 categories of financial entities across the EU, including:<\/p><ul class=\"blackUl bottomText\"><li><span style=\"font-weight: 400;\">Banks, insurers, and investment firms<\/span><\/li><li><span style=\"font-weight: 400;\">Payment and e-money institutions<\/span><\/li><li><span style=\"font-weight: 400;\">Crypto-asset service providers<\/span><\/li><li><span style=\"font-weight: 400;\">Trading venues, clearing houses, and central securities depositories<\/span><\/li><li><span style=\"font-weight: 400;\">Credit rating agencies, crowdfunding platforms, and more<\/span><\/li><\/ul><p style=\"margin-bottom: 0px;\">But the DORA meaning extends beyond traditional finance. The regulation also places critical ICT service providers under the compliance spotlight. That means if you&#8217;re delivering technology that supports any core function of a financial entity \u2014 whether it&#8217;s cloud infrastructure, data analytics, SaaS for payments or onboarding, KYC\/AML tools, AI-based fraud detection, or even API platforms that connect core systems \u2014 you&#8217;re part of the compliance chain now.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d18625 e-con-full e-flex e-con e-child\" data-id=\"3d18625\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75641d7 elementor-widget elementor-widget-heading\" data-id=\"75641d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The risks of non-compliance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-292888c elementor-widget elementor-widget-text-editor\" data-id=\"292888c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Falling short of DORA standards is a risk to your operations, your reputation, and your long-term strategy. Under DORA, the <b>European Supervisory Authorities (EBA, ESMA, and EIOPA)<\/b> now have the power to issue financial sanctions, public reprimands, and binding remediation measures. More critically, in cases where a third-party ICT provider is deemed a threat to operational stability, DORA enables regulators to force the termination of contracts, even with those vendors who provide core infrastructure or essential digital services.<\/p><p>But regulatory consequences are only part of the picture. The real cost of non-compliance is multidimensional:<\/p><ul class=\"blackUl bottomText\"><li><b>Regulatory reputation:<\/b> Institutions that fall short of DORA requirements may be flagged as high-risk, leading to tighter supervision, more inspections, and less flexibility in regulatory interactions.<\/li><li><b>Regulatory reputation:<\/b> Institutions that fall short of DORA requirements may be flagged as high-risk, leading to tighter supervision, more inspections, and less flexibility in regulatory interactions.<\/li><li><b>Board-level accountability:<\/b> DORA frames operational resilience as a governance issue. Boards must set risk thresholds, approve ICT frameworks, and oversee risk treatment with potential personal liability for major failures.<\/li><li><b>Business continuity:<\/b> A single ICT failure, either internal or third-party, can cause widespread disruption and compliance breaches, which damage trust and reputation.<\/li><li><b>Investor and media scrutiny:<\/b> Public ICT failures can hit headlines and valuations, with long-lasting effects on customer trust, investor sentiment, and team morale.<\/li><\/ul><p style=\"margin-bottom: 0px;\">That\u2019s why financial institutions aren\u2019t just looking for vendors \u2014 they\u2019re looking for resilience partners. They want tech providers who understand DORA compliance requirements, offer auditable solutions, and share accountability through strong SLAs, transparent processes, and collaborative testing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-777dfa5 elementor-widget elementor-widget-image\" data-id=\"777dfa5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"480\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-overview-of-DORA-EU-regulation-penalties.jpg\" class=\"attachment-full size-full wp-image-182685\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-overview-of-DORA-EU-regulation-penalties.jpg 1000w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-overview-of-DORA-EU-regulation-penalties-300x144.jpg 300w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-overview-of-DORA-EU-regulation-penalties-768x369.jpg 768w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Visual-overview-of-DORA-EU-regulation-penalties-18x9.jpg 18w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a64180 e-con-full e-flex e-con e-child\" data-id=\"5a64180\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-776102b e-con-full e-flex e-con e-child\" data-id=\"776102b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83af175 elementor-widget-tablet__width-inherit elementor-widget__width-initial max100 elementor-widget elementor-widget-heading\" data-id=\"83af175\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Shield your business. Achieve DORA compliance with confidence.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e1b0bd e-con-full e-flex e-con e-child\" data-id=\"1e1b0bd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22c1997 elementor-absolute elementor-widget-mobile__width-inherit transform elementor-widget elementor-widget-html\" data-id=\"22c1997\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wave-container\"><\/div>\r\n\r\n<style>\r\n  .wave-container {\r\n    width: 400px;\r\n    height: 400px;\r\n  }\r\n\r\n  @media(max-width: 767px) {\r\n    .wave-container {\r\n      width: 100%;\r\n      height: 100%;\r\n    }\r\n  }\r\n\r\n\r\n  .wave {\r\n    position: absolute;\r\n    border: 1px solid rgba(210, 184, 214, 1);\r\n    border-radius: 50%;\r\n    animation: drop 16s infinite;\r\n    top: 50%;\r\n    left: 50%;\r\n    transform: translate(-50%, -50%);\r\n    box-sizing: border-box;\r\n  }\r\n\r\n  @keyframes drop {\r\n    0% {\r\n      width: 0px;\r\n      height: 0px;\r\n      border: 1px solid rgba(210, 184, 214, 1);\r\n    }\r\n\r\n    100% {\r\n      width: 400px;\r\n      height: 400px;\r\n      border: 1px solid rgba(210, 184, 214, 0);\r\n    }\r\n  }\r\n<\/style>\r\n\r\n<script>\r\n\r\n  document.addEventListener('DOMContentLoaded', () => {\r\n    function createWaves(numberOfWaves) {\r\n      const waveContainers = document.querySelectorAll('.wave-container');\r\n\r\n      waveContainers.forEach((waveContainer) => {\r\n        for (let i = 0; i < numberOfWaves; i++) {\r\n          const wave = document.createElement('div');\r\n          wave.classList.add('wave');\r\n\r\n          wave.style.animationDelay = `${i * 0.8}s`;\r\n\r\n          waveContainer.appendChild(wave);\r\n        }\r\n      });\r\n    }\r\n\r\n    createWaves(10)\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2b0a31 elementor-align-left elementor-widget__width-initial elementor-widget-mobile__width-inherit cta-btn elementor-widget elementor-widget-button\" data-id=\"b2b0a31\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Let\u2019s talk<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0da9f0 e-con-full e-flex e-con e-child\" data-id=\"f0da9f0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-daa0641 elementor-widget elementor-widget-heading\" data-id=\"daa0641\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The real edge behind DORA finance regulation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5611812 elementor-widget elementor-widget-text-editor\" data-id=\"5611812\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For financial institutions, the DORA framework marks a fundamental shift in how operational resilience defines market leadership. Compliance alone is no longer enough. DORA forces financial firms to <b>prove they can sustain critical services through severe ICT disruptions<\/b> \u2014 even when failures occur in outsourced ecosystems beyond their direct control.<\/p><p>This is where the strategic value emerges:<\/p><ul class=\"blackUl bottomText\"><li><b>Resilience as a market credential:<\/b> Institutions that align with DORA standards and can demonstrate real operational resilience \u2014 tested, auditable, and continuously monitored \u2014 are better positioned to win client trust, secure B2B partnerships, and attract investor confidence. In a financial sector increasingly defined by digital experience and continuity, proven resilience becomes a differentiator as powerful as pricing or product innovation.<\/li><li><b>Faster recovery as a strategic edge:<\/b> Consider two payment providers hit by the same cloud service outage. The firm that reroutes transactions within minutes, thanks to tested failover systems and strong third-party contingency planning, retains clients and market reputation. The firm that takes hours to recover risks customer attrition, regulatory penalties, and public scrutiny.<\/li><li><b>Third-party control as operational stability:<\/b> DORA compels firms to extend governance over outsourced ICT functions and demands full contractual rights to audit, monitor, and intervene in third-party operations. Institutions that proactively manage these dependencies can avoid serious risks that come from unstructured vendor relationships.<\/li><li><b>Board-level integration as a trust signal:<\/b> Resilience is no longer an IT function buried in technical departments. Under the DORA EU regulation, boards must actively govern ICT risks. Institutions that embed resilience KPIs into enterprise risk frameworks, alongside capital, liquidity, and credit risk, demonstrate to regulators, clients, and partners that they are serious about operational durability.<\/li><\/ul><p style=\"margin-bottom: 0px;\">In effect, DORA finance regulation transforms resilience from a defensive compliance exercise into a proactive business strategy. Institutions that treat DORA as an opportunity will move faster, recover stronger, and build deeper trust than competitors still focused solely on technical security measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44b600f e-con-full e-flex e-con e-child\" data-id=\"44b600f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4768d6 elementor-widget elementor-widget-text-editor\" data-id=\"e4768d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cAt Innowise, we&#8217;ve thoroughly analyzed DORA\u2019s requirements and reinforced our commitment to digital resilience at every level. Whether you need consulting, DevSecOps integration, resilience testing, or full compliance support, we have the expertise to keep you ahead. We also bring the right tools and operational discipline to help you build the future of secure finance.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a5742a0 e-grid e-con-full e-con e-child\" data-id=\"a5742a0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e89f27 elementor-widget elementor-widget-image\" data-id=\"7e89f27\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"101\" height=\"100\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Rectangle-34624334.png\" class=\"attachment-full size-full wp-image-182370\" alt=\"Dzianis Kryvitski\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Rectangle-34624334.png 101w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Rectangle-34624334-12x12.png 12w\" sizes=\"(max-width: 101px) 100vw, 101px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2600cde e-con-full max100 e-flex e-con e-child\" data-id=\"2600cde\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81b6eb1 elementor-widget elementor-widget-heading\" data-id=\"81b6eb1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Dzianis Kryvitski<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-408a8fc elementor-widget elementor-widget-text-editor\" data-id=\"408a8fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Delivery Manager in FinTech<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4698b6 e-con-full e-flex e-con e-child\" data-id=\"c4698b6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4596034 elementor-widget elementor-widget-heading\" data-id=\"4596034\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DORA standards vs. existing cybersecurity frameworks\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf70229 elementor-widget elementor-widget-text-editor\" data-id=\"cf70229\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You may be wondering: if regulations like NIS (Network and Information Security Directive) 2 and GDPR (General Data Protection Regulation) were already in place, why was DORA even necessary? Good point \u2014 and in fact, NIS 2 and GDPR still play important roles in strengthening cybersecurity and data protection across the EU. However, the principal difference is that the DORA framework goes beyond safeguarding information. It focuses on ensuring the continuous delivery of critical financial services, even during severe ICT disruptions.<\/p><p>To make the distinctions clear, I\u2019ve compiled the main differences in the table below:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f9f8497 e-con-full e-flex e-con e-child\" data-id=\"f9f8497\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a9a29e tableWrapper elementor-widget elementor-widget-html\" data-id=\"7a9a29e\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table id='tableInno'>\n<tr> \n<td> \nDescription\n<\/td>   \n<td> \nDORA\n<\/td>\n<td> \nNIS 2 \n<\/td>\n<td> \nGDPR\n<\/td>\n<\/tr>   \n\n<tr> \n<td> \nScope\n<\/td>   \n<td>Applies to financial entities and critical ICT third-party providers across the EU financial sector<\/td>\n<td>Applies to essential and important entities across critical sectors in the EU<\/td>\n<td>Applies globally to organizations handling personal data of EU citizens<\/td>\n\n<\/tr> \n\n<tr> \n<td> \nPurpose\n<\/td>   \n<td>To strengthen ICT risk management, third-party oversight, and operational resilience for  uninterrupted delivery of financial services\n\n<\/td>\n<td>To improve overall cybersecurity standards across essential services, including energy, transport, healthcare, and digital infrastructure<\/td>\n<td>To protect the personal data and privacy rights of EU citizens<\/td>\n<\/tr>  \n\n<tr> \n<td>Incident reporting<\/td>   \n<td>Major ICT-related incidents must be reported without undue delay using standardized templates<\/td>\n<td>Significant cybersecurity incidents must be reported within 24 hours to national authorities<\/td>\n\n<td>Personal data breaches must be reported within 72 hours to the supervisory authority<\/td>\n\n<tr> \n<td>Third-party risk management<\/td>   \n<td>Mandatory contractual oversight, monitoring, and exit strategies for critical ICT third-party providers \n<\/td>\n<td>Supply chain cybersecurity risk management encouraged but less prescriptive compared to DORA<\/td>\n<td>Data processors must ensure security of personal data but operational resilience requirements for vendors are not defined<\/td>\n\n<\/tr> \n\n<tr class=\"hidden-row\"> \n<td>Testing & audit requirements<\/td>   \n<td>Requires periodic resilience testing, including advanced threat-led penetration testing (TLPT) every three years for critical entities<\/td>\n<td>Requires risk assessments and general cybersecurity measures but no mandatory resilience or penetration testing standards<\/td>\n<td>Requires appropriate technical and organizational security measures but no mandatory resilience testing<\/td>\n<\/tr> \n\n<tr class=\"hidden-row\"> \n<td>Governance & accountability<\/td>   \n<td>Board and management body must define, approve, oversee, and be accountable for ICT risk management<\/td>\n<td>Management must approve cybersecurity measures, but operational resilience governance is less detailed<\/td>\n<td>Data controllers and processors are accountable for data protection, but there is no specific operational resilience governance requirement<\/td>\n<\/tr> \n\n<tr class=\"hidden-row\"> \n<td> \nEnalties\n<\/td>   \n<td>No fixed penalties defined; national and EU supervisors have authority to impose fines, remediation orders, or mandate termination of critical third-party contracts<\/td>\n<td>Essential entities: up to \u20ac10M or 2% of global turnover; \nImportant entities: up to \u20ac7M or 1.4% of global turnover\n<\/td>\n<td>Severe violations: up to \u20ac20M or 4% of global turnover; \nLess severe violations: up to \u20ac10M or 2% of global turnover\n\n<\/td>\n<\/tr> \n\n    \n<\/table>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86d8140 elementor-widget elementor-widget-html\" data-id=\"86d8140\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<button class=\"serv-grid__toggle-button\">\n    <span class=\"toggle-button_label--hide hidden\">Show less<\/span>\n    <span class=\"toggle-button_label--show\">Show more<\/span>\n<\/button>\n<script>\n\"use strict\"\n    \nclass ItemHideButton {\n    constructor(options) {\n        this.init(options)\n    }\n\n    init(options) {\n        const { button, itemsToHide, hiddenItemClass, hiddenButtonLabelClass, numItemsToStayVisible, hideLabel, showLabel, container } = options;\n        \n        this.container = container;\n        this.button = button\n\n        this.hideLabel = hideLabel\n        this.showLabel = showLabel\n\n        this.numItemsToStayVisible = numItemsToStayVisible;\n        this.hiddenItemClass = hiddenItemClass;\n        this.hiddenButtonLabelClass = hiddenButtonLabelClass;\n\n        this.controlledItems = [...itemsToHide]\n\n        this.connectButton()\n\n        this.itemsHidden = true; \/\/ Start with items hidden\n    }\n\n    reset() {\n        this.controlledItems.forEach((item => item.classList.remove(this.hiddenItemClass)))\n        this.button.removeEventListener(this.clickEventListenner);\n    }\n\n    reInit(options) {\n        this.reset()\n        this.init(options)\n    }\n\n    hideItems() {\n        this.itemsHidden = true;\n        this.controlledItems.slice(this.numItemsToStayVisible).forEach((item => item.classList.add(this.hiddenItemClass)))\n    }\n    \n    showItems() {\n        this.itemsHidden = false;\n        this.controlledItems.slice(this.numItemsToStayVisible).forEach((item => item.classList.remove(this.hiddenItemClass)))\n    }\n\n    connectButton(observerOptions) {\n        this.clickEventListenner = () => {\n            if (this.itemsHidden) {\n                this.showItems()\n            } else {\n                const initialHeight = this.container.getBoundingClientRect().height;\n                this.hideItems()\n                const newHeight = this.container.getBoundingClientRect().height\n                window.scrollBy({\n                    left: 0,\n                    top: newHeight - initialHeight,\n                    behavior: \"instant\"\n                });\n            }\n\n            this.hideLabel.classList.toggle(this.hiddenButtonLabelClass)\n            this.showLabel.classList.toggle(this.hiddenButtonLabelClass)\n        }\n\n        this.button.addEventListener(\"click\", this.clickEventListenner);\n    }\n}\n\ndocument.addEventListener(\"DOMContentLoaded\", () => {\n    const button = new ItemHideButton(\n        { \n            button: document.querySelector(\".serv-grid__toggle-button\"),\n            hideLabel: document.querySelector(\".toggle-button_label--hide\"), \n            showLabel: document.querySelector(\".toggle-button_label--show\"),\n            itemsToHide: document.querySelectorAll(\"#tableInno tr:not(:first-child)\"), \n            hiddenItemClass: \"hidden-row\", \n            hiddenButtonLabelClass: \"hidden\", \n            numItemsToStayVisible: 4,\n            container: document.querySelector(\"#tableInno\")\n        }\n    )\n})\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3fb5099 e-con-full e-flex e-con e-child\" data-id=\"3fb5099\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8920045 elementor-widget elementor-widget-heading\" data-id=\"8920045\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Turning DORA compliance requirements into business action<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1283094 elementor-widget elementor-widget-text-editor\" data-id=\"1283094\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">DORA compliance is built on five pillars. Together, these pillars challenge financial institutions to rethink how they manage digital risk as a core business capability. Let\u2019s walk through what matters most and how Innowise can help you take the right steps toward full compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3fbef7 e-con-full e-flex e-con e-child\" data-id=\"d3fbef7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae4b681 elementor-widget elementor-widget-heading\" data-id=\"ae4b681\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. ICT risk management: building digital resilience into core operations<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7b8e5f elementor-widget elementor-widget-text-editor\" data-id=\"e7b8e5f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">DORA requires financial institutions to build digital resilience into every part of their operations \u2014 from identifying risks to protecting, detecting, responding, and recovering. It\u2019s not about reacting after something goes wrong. It\u2019s about staying one step ahead, minimizing disruption, and strengthening your systems before trouble hits.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32fe5e9 e-con-full e-flex e-con e-child\" data-id=\"32fe5e9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4d90eb elementor-widget elementor-widget-heading\" data-id=\"c4d90eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How Innowise can support<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26f0aef elementor-widget elementor-widget-html\" data-id=\"26f0aef\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\r\n\r\n<ul class=\"blackUl\">\r\n     <li><b>Critical systems and risk mapping:<\/b> We map your core business functions and ICT assets to spot weak points before they become crises.<\/li>\r\n   <li><b>Real-time threat detection:<\/b> Our teams configure and fine-tune SIEM and SOAR platforms to provide continuous monitoring aligned with DORA security principles.\r\n<\/li>\r\n     <li><b>GRC platform integration:<\/b> We help you choose, customize, and connect GRC tools to your workflows and make risk tracking part of your daily business.<\/li>\r\n     <li><b>Continuous risk testing and monitoring:<\/b> We run regular threat modeling, penetration tests, and automated code scans to catch risks early and strengthen defenses.<\/li>\r\n     <li><b><a href=\"https:\/\/innowise.com\/services\/devsecops\/\">DevSecOps best practices:<\/a><\/b> We embed security checks directly into your development pipelines, so resilience is built in, not bolted on.\r\n<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b85b82d e-con-full e-flex e-con e-child\" data-id=\"b85b82d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea71623 elementor-widget elementor-widget-heading\" data-id=\"ea71623\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Incident reporting: streamlining detection and regulatory notifications<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d30543 elementor-widget elementor-widget-text-editor\" data-id=\"4d30543\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Financial institutions must detect, classify, and report ICT-related incidents to regulators swiftly, following strict templates and timelines. A disorganized or delayed response can lead to reputational damage, regulatory penalties, or worse, a loss of market trust. To meet DORA\u2019s demands, businesses need to turn ad-hoc processes into streamlined, auditable workflows.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc040af e-con-full e-flex e-con e-child\" data-id=\"dc040af\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e724bce elementor-widget elementor-widget-heading\" data-id=\"e724bce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How Innowise can support<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a846552 elementor-widget elementor-widget-html\" data-id=\"a846552\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\r\n\r\n<ul class=\"blackUl\">\r\n     <li><b>Automated detection and response:<\/b> We set up smart systems that flag, classify, and escalate incidents instantly based on criticality.<\/li>\r\n   <li><b>Regulatory-ready reporting tools:<\/b> Our experts build or tune your reporting systems to auto-generate reports that meet DORA requirements.\r\n<\/li>\r\n     <li><b>Simulation drills and tabletop testing:<\/b> We organize live-fire exercises to stress-test your incident response and reporting processes.<\/li>\r\n     <li><b>Rapid incident support:<\/b> Our teams are here to guide you through real incident escalations and reporting deadlines without panic.<\/li>\r\n     <li><b>Security-first incident detection:<\/b> We also advise on implementing secure coding practices and real-time monitoring to catch issues earlier, not after the damage is done.\r\n<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e57b8ba e-con-full e-flex e-con e-child\" data-id=\"e57b8ba\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e90969e elementor-widget elementor-widget-heading\" data-id=\"e90969e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Digital operational resilience testing: stress-testing systems before they fail<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a4e8b0 elementor-widget elementor-widget-text-editor\" data-id=\"8a4e8b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">DORA doesn\u2019t just demand that businesses claim resilience. It requires them to prove it through regular, threat-led digital operational resilience testing (TLPT). Institutions must subject critical systems to extreme, realistic scenarios to expose hidden vulnerabilities and validate recovery capabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-81b483c e-con-full e-flex e-con e-child\" data-id=\"81b483c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d70fe7b elementor-widget elementor-widget-heading\" data-id=\"d70fe7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How Innowise can support<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e9cccf elementor-widget elementor-widget-html\" data-id=\"2e9cccf\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\r\n\r\n<ul class=\"blackUl\">\r\n     <li><b><a href=\"https:\/\/innowise.com\/penetration-testing-services\/\">Penetration testing<\/a> and red teaming:<\/b> We simulate real-world cyberattacks and system failures to find weaknesses before attackers do.<\/li>\r\n   <li><b>Threat-led testing programs:<\/b> Our specialists design TLPT programs tailored to your business risks and regulatory needs.\r\n<\/li>\r\n     <li><b>Disaster recovery plan testing:<\/b> We run full disaster recovery drills and recovery point testing to check if your business can bounce back when it matters.\r\n.<\/li>\r\n     <li><b>Automated testing frameworks:<\/b> We help automate resilience tests and track the results so you can show regulators real evidence.<\/li>\r\n     <li><b>Secure development and resilience:<\/b> We also advise on secure software development practices, threat modeling, and risk assessment to strengthen systems before they're tested.\r\n<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcbc656 e-con-full e-flex e-con e-child\" data-id=\"bcbc656\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ed6e9a elementor-widget elementor-widget-heading\" data-id=\"4ed6e9a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. ICT third-party risk management: controlling risks beyond your perimeter<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6341bd2 elementor-widget elementor-widget-text-editor\" data-id=\"6341bd2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Under DORA, financial institutions are directly accountable for the resilience of their third-party ICT providers \u2014 from cloud services and software vendors to outsourced IT partners. A supplier\u2019s failure could instantly become a regulatory crisis for you. That\u2019s why DORA finance regulation demands continuous oversight and documented controls across all ICT partners.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8843af4 e-con-full e-flex e-con e-child\" data-id=\"8843af4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4eae054 elementor-widget elementor-widget-heading\" data-id=\"4eae054\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How Innowise can support<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a765f3 elementor-widget elementor-widget-html\" data-id=\"5a765f3\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\r\n\r\n<ul class=\"blackUl\">\r\n     <li><b>Vendor risk inventory building:<\/b> Innowise creates centralized systems that track all your ICT suppliers, dependencies, and resilience gaps.\r\n<\/li>\r\n   <li><b>Third-party audits and assessments:<\/b> Our teams run detailed resilience audits on critical vendors \u2014 from cybersecurity defenses to incident response readiness.\r\n<\/li>\r\n     <li><b>Real-time third-party monitoring:<\/b> We integrate smart tools that continuously track vendor risks, contract compliance, and early warning signals.\r\n.<\/li>\r\n     <li><b>Contract resilience consulting:<\/b> Our experts review and strengthen ICT vendor contracts with built-in risk mitigation, transparency, and exit clauses.<\/li>\r\n     <li><b>Third-party DevSecOps alignment:<\/b> We help make sure your critical vendors meet secure development and operational standards right from onboarding.\r\n<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac5b67b e-con-full e-flex e-con e-child\" data-id=\"ac5b67b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33ead3e elementor-widget elementor-widget-heading\" data-id=\"33ead3e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Information sharing: strengthening sector-wide resilience collaboratively<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70f069d elementor-widget elementor-widget-text-editor\" data-id=\"70f069d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">DORA cybersecurity regulation encourages financial entities to actively share information on cyber threats, vulnerabilities, and incidents, not as a formality, but as a strategic defense mechanism. By contributing to trusted networks, organizations strengthen collective resilience and gain early warning intelligence that could prevent major disruptions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7707846 e-con-full e-flex e-con e-child\" data-id=\"7707846\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2a1476 elementor-widget elementor-widget-heading\" data-id=\"b2a1476\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How Innowise can support<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ff8c0b elementor-widget elementor-widget-html\" data-id=\"9ff8c0b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\r\n\r\n<ul class=\"blackUl\">\r\n     <li><b>Threat intelligence platform setup:<\/b> We connect your systems to trusted intelligence networks and integrate threat feeds into your internal defenses.\r\n<\/li>\r\n   <li><b>Secure information sharing workflows:<\/b> Our consultants build safe, compliant ways to share and receive threat information without exposing sensitive data.\r\n<\/li>\r\n     <li><b>Cyber intelligence analysis:<\/b> We help turn incoming threat feeds into clear, actionable insights that improve your risk posture.\r\n\r\n.<\/li>\r\n     <li><b>Public-private collaboration support:<\/b> We assist with technical and legal frameworks to work closely with regulators and sector resilience programs.<\/li>\r\n     <li><b>Proactive risk modeling:<\/b> We also help model risks based on external threat intelligence, so you\u2019re preparing for what\u2019s coming, not reacting to what has already happened.\r\n<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77d8ea elementor-widget elementor-widget-image\" data-id=\"b77d8ea\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1001\" height=\"678\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Infographic-showing-the-five-pillars-of-DORA-regulation.svg\" class=\"attachment-full size-full wp-image-182688\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a1544b1 e-con-full e-flex e-con e-child\" data-id=\"a1544b1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a22849d e-con-full e-flex e-con e-child\" data-id=\"a22849d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ceea679 elementor-widget-tablet__width-inherit elementor-widget__width-initial max100 elementor-widget elementor-widget-heading\" data-id=\"ceea679\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Build unstoppable resilience and stay ahead with Innowise.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d7f4a2 e-con-full e-flex e-con e-child\" data-id=\"7d7f4a2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed1ff0b elementor-absolute elementor-widget-mobile__width-inherit transform elementor-widget elementor-widget-html\" data-id=\"ed1ff0b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wave-container\"><\/div>\r\n\r\n<style>\r\n  .wave-container {\r\n    width: 400px;\r\n    height: 400px;\r\n  }\r\n\r\n  @media(max-width: 767px) {\r\n    .wave-container {\r\n      width: 100%;\r\n      height: 100%;\r\n    }\r\n  }\r\n\r\n\r\n  .wave {\r\n    position: absolute;\r\n    border: 1px solid rgba(210, 184, 214, 1);\r\n    border-radius: 50%;\r\n    animation: drop 16s infinite;\r\n    top: 50%;\r\n    left: 50%;\r\n    transform: translate(-50%, -50%);\r\n    box-sizing: border-box;\r\n  }\r\n\r\n  @keyframes drop {\r\n    0% {\r\n      width: 0px;\r\n      height: 0px;\r\n      border: 1px solid rgba(210, 184, 214, 1);\r\n    }\r\n\r\n    100% {\r\n      width: 400px;\r\n      height: 400px;\r\n      border: 1px solid rgba(210, 184, 214, 0);\r\n    }\r\n  }\r\n<\/style>\r\n\r\n<script>\r\n\r\n  document.addEventListener('DOMContentLoaded', () => {\r\n    function createWaves(numberOfWaves) {\r\n      const waveContainers = document.querySelectorAll('.wave-container');\r\n\r\n      waveContainers.forEach((waveContainer) => {\r\n        for (let i = 0; i < numberOfWaves; i++) {\r\n          const wave = document.createElement('div');\r\n          wave.classList.add('wave');\r\n\r\n          wave.style.animationDelay = `${i * 0.8}s`;\r\n\r\n          waveContainer.appendChild(wave);\r\n        }\r\n      });\r\n    }\r\n\r\n    createWaves(10)\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fbbbf3 elementor-align-left elementor-widget__width-initial elementor-widget-mobile__width-inherit cta-btn elementor-widget elementor-widget-button\" data-id=\"0fbbbf3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get in touch.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-635b0ae e-con-full e-flex e-con e-child\" data-id=\"635b0ae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8eea3a9 elementor-widget elementor-widget-heading\" data-id=\"8eea3a9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Starting your journey toward full DORA security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5718277 elementor-widget elementor-widget-text-editor\" data-id=\"5718277\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Meeting DORA compliance requirements demands a clear, structured approach that connects risk management, incident response, third-party oversight, and operational testing. I&#8217;ve mapped out the essential steps to help you move from compliance on paper to resilience in practice.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd6656e e-con-full process-block e-flex e-con e-child\" data-id=\"cd6656e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c36d220 elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"c36d220\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hws-flex-hover\">\n    <div class=\"hws-into\">\n        <div class=\"hws-c\">\n            <span class=\"hws-cifr\">01<\/span>\n\n                <svg class=\"hws-arrow\" width=\"8\" height=\"17\" viewBox=\"0 0 8 17\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5ZM4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5Z\" fill=\"#2E2E2E\"\/>\n<\/svg>\n\n\n        <\/div>\n        <div class=\"hws-t\">Review your ICT risk management framework<\/div>\n    <\/div>\n    <div class=\"hws-text\">\n        <div>Check if you have a formal ICT risk management framework. If not, building one should be your first move. Use established standards as a foundation and align them with DORA\u2019s full risk lifecycle.<\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-218a025 elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"218a025\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hws-flex-hover\">\n    <div class=\"hws-into\">\n        <div class=\"hws-c\">\n            <span class=\"hws-cifr\">02<\/span>\n                <svg class=\"hws-arrow\" width=\"8\" height=\"17\" viewBox=\"0 0 8 17\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5ZM4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5Z\" fill=\"#2E2E2E\"\/>\n<\/svg>\n        <\/div>\n        <div class=\"hws-t\">Identify gaps against DORA requirements<\/div>\n    <\/div>\n    <div class=\"hws-text\">\n        <div>Assess whether your current framework fully meets DORA expectations. Focus on <a href=\"https:\/\/innowise.com\/services\/security-testing\/\">security testing<\/a>, resilience KPIs, third-party risk management, and governance to shape your immediate priorities.<\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f305962 elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"f305962\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hws-flex-hover\">\n    <div class=\"hws-into\">\n        <div class=\"hws-c\">\n            <span class=\"hws-cifr\">03<\/span>\n                <svg class=\"hws-arrow\" width=\"8\" height=\"17\" viewBox=\"0 0 8 17\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5ZM4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5Z\" fill=\"#2E2E2E\"\/>\n<\/svg>\n        <\/div>\n        <div class=\"hws-t\">Strengthen your incident response and reporting<\/div>\n    <\/div>\n    <div class=\"hws-text\">\n        <div>Evaluate your incident detection, escalation, and reporting. Confirm they meet DORA\u2019s timelines and content requirements. If needed, upgrade workflows, reporting templates, and escalation paths.\n<\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d7778b elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"8d7778b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hws-flex-hover\">\n    <div class=\"hws-into\">\n        <div class=\"hws-c\">\n            <span class=\"hws-cifr\">04<\/span>\n                <svg class=\"hws-arrow\" width=\"8\" height=\"17\" viewBox=\"0 0 8 17\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5ZM4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5Z\" fill=\"#2E2E2E\"\/>\n<\/svg>\n        <\/div>\n        <div class=\"hws-t\">Build a threat-led testing program\n<\/div>\n    <\/div>\n    <div class=\"hws-text\">\n        <div>Build a resilience testing plan. Define what systems you will test, how often, and how results will be documented. Include penetration testing, scenario-based drills, and red teaming where relevant.<\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afad1da elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"afad1da\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hws-flex-hover\">\n    <div class=\"hws-into\">\n        <div class=\"hws-c\">\n            <span class=\"hws-cifr\">05<\/span>\n                <svg class=\"hws-arrow\" width=\"8\" height=\"17\" viewBox=\"0 0 8 17\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5ZM4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5Z\" fill=\"#2E2E2E\"\/>\n<\/svg>\n        <\/div>\n        <div class=\"hws-t\">Develop a DORA compliance roadmap<\/div>\n    <\/div>\n    <div class=\"hws-text\">\n        <div>Create a structured roadmap covering required investments, system upgrades, governance changes, and staff training. Prioritize critical areas first and align timelines with regulatory milestones.<\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1d0414 elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"a1d0414\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hws-flex-hover\">\n    <div class=\"hws-into\">\n        <div class=\"hws-c\">\n            <span class=\"hws-cifr\">06<\/span>\n                <svg class=\"hws-arrow\" width=\"8\" height=\"17\" viewBox=\"0 0 8 17\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5ZM4.35355 16.3536C4.15829 16.5488 3.84171 16.5488 3.64644 16.3536L0.464464 13.1716C0.269202 12.9763 0.269202 12.6597 0.464464 12.4645C0.659727 12.2692 0.976309 12.2692 1.17157 12.4645L4 15.2929L6.82843 12.4645C7.02369 12.2692 7.34027 12.2692 7.53553 12.4645C7.73079 12.6597 7.73079 12.9763 7.53553 13.1716L4.35355 16.3536ZM4.5 6.55671e-08L4.5 1L3.5 1L3.5 -6.55671e-08L4.5 6.55671e-08ZM4.5 3L4.5 5H3.5L3.5 3H4.5ZM4.5 7L4.5 9H3.5L3.5 7H4.5ZM4.5 11L4.5 13H3.5L3.5 11H4.5ZM4.5 15L4.5 16H3.5L3.5 15H4.5Z\" fill=\"#2E2E2E\"\/>\n<\/svg>\n        <\/div>\n        <div class=\"hws-t\">Automate risk monitoring & compliance reporting<\/div>\n    <\/div>\n    <div class=\"hws-text\">\n        <div>Automate risk assessments, incident tracking, and compliance reporting. Custom software, DevSecOps practices, and integrated monitoring tools make compliance scalable, repeatable, and auditable.<\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-488a88d elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-html\" data-id=\"488a88d\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<link rel=\"stylesheet\" href=\"\/wp-content\/themes\/hello-elementor\/swiper-bundle.min.css\">\r\n<link rel=\"stylesheet\" href=\"\/wp-content\/themes\/hello-elementor\/accordion.min.css\">\r\n<link rel=\"stylesheet\" href=\"\/wp-content\/themes\/hello-elementor\/arrows-dev-process.css\">\r\n\r\n<div class=\"dev-process-arrows-container light\">\r\n\r\n  <div class=\"dev-process-arrows-accordion\">\r\n    <div class=\"dev-process-arrows-accordion-item active-3\">\r\n      <div class=\"dev-process-arrows-accordion-item-image light\"><\/div>\r\n      <div class=\"dev-process-arrows-accordion-item-header light\">\r\n        <span>01<\/span>\r\n        <span>Review your ICT risk management framework<\/span>\r\n      <\/div>\r\n      <span class=\"dev-process-arrows-accordion-item-description light\">Check if you have a formal ICT risk management framework. If not, building one should be your first move. Use established standards as a foundation and align them with DORA\u2019s full risk lifecycle.\r\n<\/span>\r\n    <\/div>\r\n    <div class=\"dev-process-arrows-accordion-item\">\r\n      <div class=\"dev-process-arrows-accordion-item-image light\"><\/div>\r\n      <div class=\"dev-process-arrows-accordion-item-header light\">\r\n        <span>02<\/span>\r\n        <span class='light-title'>Identify gaps against DORA requirements\r\n<\/span>\r\n      <\/div>\r\n      <span class=\"dev-process-arrows-accordion-item-description light\">Assess whether your current framework fully meets DORA expectations. Focus on <a href=\"https:\/\/innowise.com\/services\/security-testing\/\">security testing<\/a>, resilience KPIs, third-party risk management, and governance to shape your immediate priorities.\r\n<\/span>\r\n    <\/div>\r\n    <div class=\"dev-process-arrows-accordion-item\">\r\n      <div class=\"dev-process-arrows-accordion-item-image light\"><\/div>\r\n      <div class=\"dev-process-arrows-accordion-item-header light\">\r\n        <span>03<\/span>\r\n        <span class='light-title'>Strengthen your incident response and reporting<\/span>\r\n      <\/div>\r\n      <span class=\"dev-process-arrows-accordion-item-description light\">Evaluate your incident detection, escalation, and reporting. Confirm they meet DORA\u2019s timelines and content requirements. If needed, upgrade workflows, reporting templates, and escalation paths.\r\n<\/span>\r\n    <\/div>\r\n    \r\n\r\n    <div class=\"dev-process-arrows-accordion-item\">\r\n      <div class=\"dev-process-arrows-accordion-item-image light\"><\/div>\r\n      <div class=\"dev-process-arrows-accordion-item-header light\">\r\n        <span>04<\/span>\r\n        <span class='light-title'>Build a threat-led testing program\r\n<\/span>\r\n      <\/div>\r\n      <span class=\"dev-process-arrows-accordion-item-description light\">Build a resilience testing plan. Define what systems you will test, how often, and how results will be documented. Include penetration testing, scenario-based drills, and red teaming where relevant.\r\n<\/span>\r\n    <\/div>\r\n    \r\n    <div class=\"dev-process-arrows-accordion-item\">\r\n      <div class=\"dev-process-arrows-accordion-item-image light\"><\/div>\r\n      <div class=\"dev-process-arrows-accordion-item-header light\">\r\n        <span>05<\/span>\r\n        <span class='light-title'>Develop a DORA compliance roadmap\r\n<\/span>\r\n      <\/div>\r\n      <span class=\"dev-process-arrows-accordion-item-description light\">Create a structured roadmap covering required investments, system upgrades, governance changes, and staff training. Prioritize critical areas first and align timelines with regulatory milestones.\r\n\r\n<\/span>\r\n    <\/div>\r\n    \r\n    <div class=\"dev-process-arrows-accordion-item\">\r\n      <div class=\"dev-process-arrows-accordion-item-image light\"><\/div>\r\n      <div class=\"dev-process-arrows-accordion-item-header light\">\r\n        <span>06<\/span>\r\n        <span class='light-title'>Automate risk monitoring & compliance reporting\r\n<\/span>\r\n      <\/div>\r\n      <span class=\"dev-process-arrows-accordion-item-description light\">Automate risk assessments, incident tracking, and compliance reporting. Custom software, DevSecOps practices, and integrated monitoring tools make compliance scalable, repeatable, and auditable.\r\n<\/span>\r\n    <\/div>\r\n  <\/div>\r\n\r\n<\/div>\r\n\r\n\r\n\r\n<script src=\"\/wp-content\/themes\/hello-elementor\/assets\/js\/swiper-bundle.min.js\"><\/script>\r\n<script src=\"\/wp-content\/themes\/hello-elementor\/assets\/js\/accordion.min.js\"><\/script>\r\n<script defer>\r\n\r\n\r\n  \/* ******************************** *\/\r\n\r\n  \/* START UP *\/\r\n\r\n\r\n  const arrowsGroupElement = document.querySelector(\r\n    '#dev-process-arrows-map-svg g'\r\n  );\r\n\r\n\r\n  const mapSvgArrows = arrowsGroupElement.querySelectorAll(\r\n    '.dev-process-arrows-map__arrow'\r\n  );\r\n  const arrowDesciptionElements = document.querySelectorAll(\r\n    '.dev-process-arrows-map__item'\r\n  );\r\n\r\n\r\n\r\n  const centerArrowDescriptionElement = function () {\r\n\r\n    const numberElement = document.querySelectorAll(\r\n      '.dev-process-arrows-map__item-number'\r\n    );\r\n\r\n    const elements = document.querySelectorAll(\".dev-process-arrows-map__item\")\r\n\r\n\r\n    elements\r\n      .forEach((elem, index) => {\r\n        const tittles = elem.querySelectorAll(\".dev-process-arrows-map__item-title\");\r\n        const number = elem.querySelector('.dev-process-arrows-map__item-number');\r\n        const numberWidth = number.getComputedTextLength();\r\n        const elemBoxWidth = elem.getComputedTextLength();\r\n        const elemBoxX = +number.getAttribute('x');\r\n        tittles.forEach(el => {\r\n          const elWidth = el.getComputedTextLength();\r\n          const elLeftPos = elemBoxX - (elWidth \/ 2.0) + (numberWidth \/ 2.0);\r\n          el.setAttribute('x', elLeftPos);\r\n        })\r\n      });\r\n  };\r\n\r\n  centerArrowDescriptionElement();\r\n\r\n  \/* ******************************** *\/\r\n\r\n  \/* SWIPER *\/\r\n\r\n  const devProcessArrowsSwiper = new Swiper('.dev-process-arrows-swiper', {\r\n    navigation: {\r\n      nextEl: '#dev-process-arrows-swiper-pagination-right',\r\n      prevEl: '#dev-process-arrows-swiper-pagination-left',\r\n      disabledClass: 'dev-process-arrows-swiper__pagination-arrow_inactive',\r\n    },\r\n    allowTouchMove: false,\r\n  });\r\n\r\n  arrowDesciptionElements.forEach((node, index) => {\r\n    node.addEventListener('click', () => {\r\n      slideToMapItem(node, index);\r\n    });\r\n  });\r\n\r\n\r\n  const changeArrow = function (index) {\r\n\r\n  }\r\n\r\n  const slideToMapItem = function (node, index) {\r\n    devProcessArrowsSwiper.slideTo(index);\r\n    arrowDesciptionElements.forEach(el => el.classList.remove('dev-process-arrows-map__item_active'));\r\n    mapSvgArrows.forEach((el, i) => {\r\n      el.classList.remove('dev-process-arrows-map__arrow_active');\r\n\r\n    });\r\n    mapSvgArrows[index].classList.add('dev-process-arrows-map__arrow_active');\r\n    node.classList.add('dev-process-arrows-map__item_active');\r\n\r\n\r\n  };\r\n\r\n  devProcessArrowsSwiper.on('slideChange', function (e) {\r\n    const i = devProcessArrowsSwiper.activeIndex;\r\n    arrowDesciptionElements.forEach(el => el.classList.remove('dev-process-arrows-map__item_active'));\r\n    mapSvgArrows.forEach((el, i) => {\r\n      el.classList.remove('dev-process-arrows-map__arrow_active');\r\n\r\n    });\r\n    mapSvgArrows[i].classList.add('dev-process-arrows-map__arrow_active');\r\n    arrowDesciptionElements[i].classList.add('dev-process-arrows-map__item_active');\r\n\r\n\r\n  });\r\n\r\n  \/* ******************************** *\/\r\n<\/script>\r\n<script>\r\n  let elements = document.getElementsByClassName(\"dev-process-arrows-accordion-item\");\r\n  for (let i = 0; i < elements.length; i++) {\r\n    elements[i].addEventListener('click', function () {\r\n      for (let i = 0; i < elements.length; i++) {\r\n        elements[i].classList.remove('active-3');\r\n      }\r\n      this.classList.add('active-3');\r\n    })\r\n  }\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62d135f elementor-widget elementor-widget-text-editor\" data-id=\"62d135f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Though these steps provide a solid starting point, every company\u2019s path to DORA security will look a little different. You may need a broader scope, a deeper focus, or simply more confidence that nothing has been missed. In these cases, the smartest move is to have <a href=\"\">cybersecurity experts<\/a> by your side \u2014 professionals who can guide you through the entire process and dive deep into the critical areas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23a0fad e-con-full e-flex e-con e-child\" data-id=\"23a0fad\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9fadae6 elementor-widget elementor-widget-heading\" data-id=\"9fadae6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Innowise expertise for DORA compliance\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a347da elementor-widget elementor-widget-text-editor\" data-id=\"3a347da\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Achieving DORA compliance demands proven expertise in cybersecurity, operational resilience, and regulatory readiness. At Innowise, we bring a strong foundation of recognized standards, frameworks, and real-world technical capabilities that align directly with <\/span><span style=\"font-weight: 400;\">DORA requirements<\/span><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\">Our compliance and resilience expertise includes:<\/span><\/p><ul class=\"blackUl bottomText\"><li><b>ISO 27001 Certification (information security management system)<\/b><\/li><\/ul><p>We apply ISO 27001 best practices to build strong risk management, governance, and incident response frameworks, which are the critical foundations for DORA compliance.<\/p><ul class=\"blackUl bottomText\"><li><b>Alignment with the NIST cybersecurity framework<\/b><\/li><\/ul><p>We structure our resilience programs around NIST principles, covering threat identification, protection, detection, response, and recovery, fully in line with DORA\u2019s operational risk approach.<\/p><ul class=\"blackUl bottomText\"><li><b>SOC 2 Type II Compliance (for cloud-based and managed services)<\/b><\/li><\/ul><p>When delivering cloud or managed services, our SOC 2 compliance ensures robust controls over data security, availability, and confidentiality to support DORA\u2019s third-party oversight requirements.<\/p><ul class=\"blackUl bottomText\"><li><b>Advanced Cloud Security Posture Management (CSPM)<\/b><\/li><\/ul><p>We use leading CSPM tools (like Chef Compliance, tfsec, OpenSCAP, CloudBots) to detect and fix misconfigurations across cloud environments, thereby reducing operational risk.<\/p><ul class=\"blackUl bottomText\"><li><b>Continuous compliance monitoring and reporting<\/b><\/li><\/ul><p>Tools such as ELK, Nagios, Prometheus, Grafana, and Kibana allow us to deliver real-time compliance status, incident insights, and resilience trends, which are critical for DORA\u2019s monitoring and reporting expectations.<\/p><ul class=\"blackUl bottomText\"><li><b>Built-in compliance controls<\/b><\/li><\/ul><p>Our development and operational practices incorporate pre-approved compliance controls through tools like Terraform and Ansible, ensuring regulatory readiness at every stage of the technology lifecycle.<\/p><ul class=\"blackUl bottomText\"><li><b>Automated compliance audits<\/b><\/li><\/ul><p>Regular resilience audits using platforms like Lynis, Wazuh, Checkov, OpenSCAP, and CIS-CAT keep operational resilience practices current and ready for regulatory scrutiny.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a87dd83 e-con-full e-flex e-con e-child\" data-id=\"a87dd83\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2065844 e-con-full e-flex e-con e-child\" data-id=\"2065844\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35bad37 elementor-widget-tablet__width-inherit elementor-widget__width-initial max100 elementor-widget elementor-widget-heading\" data-id=\"35bad37\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Future-proof your compliance with Innowise expertise.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1956bc e-con-full e-flex e-con e-child\" data-id=\"f1956bc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b10aece elementor-absolute elementor-widget-mobile__width-inherit transform elementor-widget elementor-widget-html\" data-id=\"b10aece\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wave-container\"><\/div>\r\n\r\n<style>\r\n  .wave-container {\r\n    width: 400px;\r\n    height: 400px;\r\n  }\r\n\r\n  @media(max-width: 767px) {\r\n    .wave-container {\r\n      width: 100%;\r\n      height: 100%;\r\n    }\r\n  }\r\n\r\n\r\n  .wave {\r\n    position: absolute;\r\n    border: 1px solid rgba(210, 184, 214, 1);\r\n    border-radius: 50%;\r\n    animation: drop 16s infinite;\r\n    top: 50%;\r\n    left: 50%;\r\n    transform: translate(-50%, -50%);\r\n    box-sizing: border-box;\r\n  }\r\n\r\n  @keyframes drop {\r\n    0% {\r\n      width: 0px;\r\n      height: 0px;\r\n      border: 1px solid rgba(210, 184, 214, 1);\r\n    }\r\n\r\n    100% {\r\n      width: 400px;\r\n      height: 400px;\r\n      border: 1px solid rgba(210, 184, 214, 0);\r\n    }\r\n  }\r\n<\/style>\r\n\r\n<script>\r\n\r\n  document.addEventListener('DOMContentLoaded', () => {\r\n    function createWaves(numberOfWaves) {\r\n      const waveContainers = document.querySelectorAll('.wave-container');\r\n\r\n      waveContainers.forEach((waveContainer) => {\r\n        for (let i = 0; i < numberOfWaves; i++) {\r\n          const wave = document.createElement('div');\r\n          wave.classList.add('wave');\r\n\r\n          wave.style.animationDelay = `${i * 0.8}s`;\r\n\r\n          waveContainer.appendChild(wave);\r\n        }\r\n      });\r\n    }\r\n\r\n    createWaves(10)\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30f1aae elementor-align-left elementor-widget__width-initial elementor-widget-mobile__width-inherit cta-btn elementor-widget elementor-widget-button\" data-id=\"30f1aae\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Let\u2019s start<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b84e17 e-con-full e-flex e-con e-child\" data-id=\"6b84e17\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-371f87e elementor-widget elementor-widget-heading\" data-id=\"371f87e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DORA and the future of financial cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f993fec elementor-widget elementor-widget-text-editor\" data-id=\"f993fec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DORA is shaking up the financial world \u2014 and not quietly. The regulation is now in full swing, but for many institutions and vendors, things still feel a bit uncertain. I\u2019ve had countless conversations lately with tech leads, compliance teams, and board members trying to unpack the DORA meaning in real, operational terms. So, I\u2019m laying out the most common questions I get \u2014 and how I see it all unfolding.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-703185c e-con-full e-flex e-con e-child\" data-id=\"703185c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c24e145 elementor-widget elementor-widget-heading\" data-id=\"c24e145\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">DORA is here. So what now?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41a6901 elementor-widget elementor-widget-text-editor\" data-id=\"41a6901\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Now that DORA is live, most financial institutions have moved from planning to doing. But here\u2019s the reality \u2014 a lot of companies still aren\u2019t fully there. According to a <a href=\"https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/europes-new-resilience-regime-the-race-to-get-ready-for-dora\">McKinsey survey<\/a> from mid-2024, only about a third of firms felt confident they\u2019d meet all DORA requirements by January 2025. Even the confident ones admitted they\u2019d be ironing out processes well into this year. The biggest pain point? Managing third-party risk at scale. For many, just figuring out which vendors count as \u201ccritical\u201d under the DORA framework has been a project in itself.<\/p><p>So, what\u2019s actually happening on the ground? Teams are getting more organized. Companies are setting up dedicated DORA programs, pulling in people from IT, legal, compliance, and procurement, and investing in platforms that bring everything under one roof. There\u2019s also a growing shift from treating DORA as \u201cjust another IT thing\u201d to making it a board-level conversation. One recurring challenge is working with smaller tech vendors who simply don\u2019t have the resources to hit all the compliance marks. That means some financial institutions are now acting as support partners, not just clients.<\/p><p>And the pressure isn\u2019t stopping at DORA. Inside the EU, NIS 2 is tightening rules for critical infrastructure, and the Cyber Resilience Act is about to put product-level security under the microscope. Meanwhile, regulators outside the EU are watching closely. The UK\u2019s FCA and PRA have already rolled out their own resilience rules, and in the US, the SEC now expects public companies to disclose how they handle cyber risks. If you\u2019re thinking long-term, DORA finance regulation isn\u2019t just a European rule \u2014 it\u2019s a global starting point.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c93aaaf e-con-full e-flex e-con e-child\" data-id=\"c93aaaf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-054941c elementor-widget elementor-widget-heading\" data-id=\"054941c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Will AI and automation make compliance less of a headache?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4759bf1 elementor-widget elementor-widget-text-editor\" data-id=\"4759bf1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/innowise.com\/case\/ai-regulatory-compliance-software\/\">AI for regulatory compliance<\/a> is definitely going to play a bigger role \u2014 not just in theory, but in day-to-day operations. A lot of teams are already using natural language processing (NLP) tools to go through massive piles of contracts and vendor agreements. These tools help spot red flags automatically, like missing audit rights or vague recovery time guarantees. Instead of relying on lawyers or compliance leads to scan through every line manually, companies are plugging in AI to flag risks upfront and keep documentation tight from day one.<\/p><p>On the automation side, things are moving fast. Tools like SOAR \u2014 that\u2019s Security Orchestration, Automation, and Response \u2014 are making it way easier to handle incidents without the chaos. Let\u2019s say something breaks. These platforms can trigger alerts, lock things down, and even generate the initial DORA-compliant report for regulators, all without a human jumping in first. And GRC platforms like ServiceNow or MetricStream are leveling up, too. They\u2019re adding smart dashboards, automated resilience testing, and bots that remind teams when to run drills or check on third-party KPIs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e4cfc9d e-con-full e-flex e-con e-child\" data-id=\"e4cfc9d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a02d6d7 elementor-widget elementor-widget-heading\" data-id=\"a02d6d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How does DORA affect software development outsourcing?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0023c68 elementor-widget elementor-widget-text-editor\" data-id=\"0023c68\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DORA doesn\u2019t regulate tech vendors directly, but it does hold financial institutions fully responsible for the resilience of the software they use. That\u2019s a big deal. It means banks, insurers, and fintechs can\u2019t just pick a dev team based on speed or budget anymore. If your code ends up in anything remotely critical \u2014 like payments, onboarding, trading platforms \u2014 then your client needs to prove that the software is secure, tested, and traceable from end to end.<\/p><p>So what does that actually look like in practice? Procurement teams are now asking for things like secure SDLC documentation, automated test logs, and vulnerability scan reports right up front. Contracts are getting updated with resilience clauses that cover everything from backup recovery times to incident response responsibilities. Some companies are even running joint testing sessions with their vendors to stress-test response times. The Bottom line is if you&#8217;re building <a href=\"https:\/\/innowise.com\/industries\/finance\/\">financial software<\/a> for a client, you&#8217;re part of their compliance story now.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b04b3d4 e-con-full e-flex e-con e-child\" data-id=\"b04b3d4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8eda0ca elementor-widget elementor-widget-heading\" data-id=\"8eda0ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Final thoughts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-045bda7 elementor-widget elementor-widget-text-editor\" data-id=\"045bda7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I hope you\u2019re walking away from this post feeling a little more confident about DORA \u2014 or at the very least, asking yourself the right questions. And honestly, that\u2019s already a big step. Whether you\u2019re just starting to unpack the regulation or knee-deep in implementation, the path to compliance doesn\u2019t have to be overwhelming.<\/p><p>At Innowise, we\u2019re here to help you make sense of the DORA maze, build real digital resilience, and keep your business protected not just for now, but for whatever comes next.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f24459 e-con-full e-flex e-con e-child\" data-id=\"7f24459\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c89a460 elementor-widget elementor-widget-shortcode\" data-id=\"c89a460\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">[post_share]<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43a0c63 e-con-full tablePadding40 e-flex e-con e-child\" data-id=\"43a0c63\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f8524ba e-grid e-con-full e-con e-child\" data-id=\"f8524ba\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96f5913 elementor-widget elementor-widget-image\" data-id=\"96f5913\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2024\/09\/Rectangle-34624315.png\" class=\"attachment-full size-full wp-image-172128\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2024\/09\/Rectangle-34624315.png 160w, https:\/\/innowise.com\/wp-content\/uploads\/2024\/09\/Rectangle-34624315-150x150.png 150w, https:\/\/innowise.com\/wp-content\/uploads\/2024\/09\/Rectangle-34624315-12x12.png 12w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-326d86b e-con-full e-flex e-con e-child\" data-id=\"326d86b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ac422d3 e-con-full e-flex e-con e-child\" data-id=\"ac422d3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6065798 fioBottom elementor-widget elementor-widget-heading\" data-id=\"6065798\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/innowise.com\/authors\/siarhei-sukhadolski\/\" target=\"_blank\">Siarhei Sukhadolski<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5eb3851 elementor-widget elementor-widget-image\" data-id=\"5eb3851\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/sergey-sukhodolskiy\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"33\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/04\/Social-icons-1.svg\" class=\"attachment-full size-full wp-image-181902\" alt=\"Linkedin icon\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d30fe50 elementor-widget elementor-widget-text-editor\" data-id=\"d30fe50\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>FinTech Expert<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-86069e5 e-con-full e-flex e-con e-child\" data-id=\"86069e5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae37326 text4String elementor-widget elementor-widget-text-editor\" data-id=\"ae37326\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Siarhei leads our FinTech direction with deep industry knowledge and a clear view of where digital finance is heading. He helps clients navigate complex regulations and technical choices, shaping solutions that are not just secure \u2014 but built for growth.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f99178 readMore elementor-widget elementor-widget-heading\" data-id=\"5f99178\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/innowise.com\/authors\/siarhei-sukhadolski\/\" target=\"_blank\">Read more<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b7f46c table-content-container e-con-full e-flex e-con e-child\" data-id=\"0b7f46c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c64ce58 e-con-full stickyTable e-flex e-con e-child\" data-id=\"c64ce58\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ef974aa author-block e-con-full e-flex e-con e-child\" data-id=\"ef974aa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c20a8a ddcv elementor-widget elementor-widget-html\" data-id=\"7c20a8a\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n\r\n.article-description > .e-con-inner{\r\n     align-items: baseline !important;\r\n}\r\n\r\n.table-content-container {\r\n    position: sticky;\r\n    top: 72px;\r\n    bottom: auto;   \r\n}  \r\n\r\n<\/style>\r\n\r\n<script>\r\ndocument.addEventListener(\"DOMContentLoaded\", ()=>{\r\n        \r\nconst headerElement = document.querySelector(\".new-menu\");\r\n\r\nconst stickyElement = document.querySelector(\".table-content-container\");\r\n\r\nconst headerElementH = headerElement.clientHeight;\r\n\r\nstickyElement.style.top =  headerElementH + 60 + \"px\"\r\n        \r\n});\r\n<\/script>\r\n\r\n<!--NOTE Change data-id in wrapper styles for hide this block on the mobile device screen-->\r\n<div class=\"toc-wrapper\">\r\n  <h4 class=\"toc-title\">Table of contents<\/h4>\r\n  <div class=\"toc toc-2\"><\/div>\r\n<\/div>\r\n\r\n<script>\r\n  \/\/NOTE Add the value from h2 as the key and the text you want to display as the key value in LINKS variable:\r\n  \/\/   const LINKS = {\r\n  \/\/       \"The demand for retail digital transformation\": \"The demand\"\r\n  \/\/   }\r\n\r\n  const LINKS = {\r\n    \"Unleashing the power of .NET 8\": \"gggggg\",\r\n    \"Revamping legacy systems: unlocking business potential through software modernization\":\r\n      \"hello\",\r\n  };\r\n\r\n  const OFFSET = 70;\r\n   const PADDING_BOTTOM_FOR_SCROLL = 100;\r\n  let headerList = [];\r\n  let allLinks = [];\r\n  \r\n  let ticking = false;\r\n     \r\n\r\n  const createList = () => {\r\n      \r\n      console.log('create');\r\n      \r\n      \r\n    const tocTarget = document.querySelector(\".toc.toc-2\");\r\n    const toc = document.createElement(\"ul\");\r\n    \r\n    \r\n    \r\n     headerList = [...document.querySelectorAll(\"h2\")];\r\n\r\n\r\n    \r\n    headerList = headerList.slice(0, -3);\r\n    \r\n    \r\n    \r\n    \r\n   headerList.forEach((header,index) => {\r\n      const headerId = header.getAttribute(\"id\");\r\n      const headerText =\r\n        header.dataset.title && header.dataset.title !== \"\"\r\n          ? header.dataset.title\r\n          : header.textContent;\r\n          \r\n\r\n      const headerTocText = header.dataset.title;\r\n\r\n      const idFromText =\r\n        !headerId || headerId === \"\"\r\n          ? headerText\r\n              .toLowerCase()\r\n              .replace(\/[^\\w ]+\/g, \"\")\r\n              .replace(\/ +\/g, \"-\")\r\n          : headerId;\r\n          \r\n         \r\n\r\n      const newListItem = document.createElement(\"li\");\r\n      const newLink = document.createElement(\"a\");\r\n      newLink.setAttribute(\"href\", \"#\" + idFromText);\r\n      newLink.textContent = LINKS[headerText] || headerText;\r\n\r\n      newLink.addEventListener(\"click\", (e) => {\r\n          \r\n        e.preventDefault();\r\n        const y =\r\n          header.getBoundingClientRect().top +\r\n          window.pageYOffset -\r\n          PADDING_BOTTOM_FOR_SCROLL -\r\n          OFFSET;\r\n          ticking = true; \r\n        window.scrollTo({ top: y, behavior: \"smooth\" });\r\n        \r\n        setTimeout(()=>{\r\n            ticking = false;\r\n        },500);\r\n        \r\n      });\r\n      \r\n\r\n      newListItem.appendChild(newLink);\r\n    toc.appendChild(newListItem);\r\n    \r\n    \r\n    });\r\n    tocTarget.appendChild(toc);\r\n    allLinks = Array.from(document.querySelector(\".toc.toc-2\").querySelectorAll(\"ul li\"));\r\n  };\r\n\r\n  const setContainerHeight = () => {\r\n    const windowHeight = window.innerHeight;\r\n    const tocContainer = document.querySelector(\".ddcv\");\r\n\r\n    tocContainer.style.maxHeight = \"calc(100vh - 230px)\";\r\n    tocContainer.style.minHeight = \"200px\";\r\n  };\r\n\r\n\r\n  const checkScroll = () => {\r\n      const windowHeight = window.innerHeight;\r\n      const scrollTop = window.scrollY || document.documentElement.scrollTop;\r\n\r\n      let selectedHeaderIndex = -1;\r\n\r\n      headerList.forEach((header, index) => {\r\n        \r\n  const posTop = header.getBoundingClientRect().top;\r\n       \r\n\r\n const isInViewport = posTop + elem.clientHeight <= window.innerHeight ;\r\n \r\n\r\n \r\n if(isInViewport){\r\n      selectedHeaderIndex = index;\r\n }\r\n        \r\n\r\n\r\n        \r\n      });\r\n      \r\n\r\n\r\n        allLinks.forEach((link, i) => {\r\n            if(i === selectedHeaderIndex){\r\n              link.classList.remove(\"pre-active\");  \r\n              link.classList.add(\"active\");\r\n            }\r\n            if(i < selectedHeaderIndex){\r\n              link.classList.add(\"pre-active\"); \r\n               link.classList.remove(\"active\");\r\n            }\r\n             if(i > selectedHeaderIndex){\r\n            link.classList.remove(\"pre-active\");\r\n            link.classList.remove(\"active\");\r\n            }\r\n            \r\n            \r\n            \r\n        });\r\n        \r\n\r\n\r\n  };\r\n\r\n  const loadAllImages = () => {\r\n    const images = document.getElementsByTagName(\"img\");\r\n\r\n    for (let i = 0; i < images.length; i++) {\r\n      const img = images[i];\r\n      const src = img.getAttribute(\"data-src\") || img.src;\r\n      img.src = src;\r\n    }\r\n  };\r\n\r\n  loadAllImages();\r\n  \r\n  \r\n  \r\n\r\n\r\n  document.addEventListener(\"DOMContentLoaded\", () => {\r\n     setTimeout(()=>{\r\n           createList();\r\n    setContainerHeight();\r\n  \r\n    \r\n    document.addEventListener(\"scroll\", (event) => {\r\n  if (!ticking) {\r\n    checkScroll();\r\n  }\r\n});\r\n    \r\n    \r\n},300) \r\n\r\n    \r\n  });\r\n\r\n\r\n  \r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc7d4b9 e-flex e-con-boxed e-con e-parent\" data-id=\"cc7d4b9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d13a73 elementor-widget elementor-widget-shortcode\" data-id=\"1d13a73\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f100240-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"100240\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/pt\/wp-json\/wp\/v2\/posts\/182675#wpcf7-f100240-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" enctype=\"multipart\/form-data\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"100240\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f100240-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<style>\n#form-templates .contact__info {\n  background-color: #f4f4f4;\n  padding: 70px 44px 70px 50px;\n  position: relative;\n  max-width: 540px;\n  width: 100%;\nborder: 1px solid #AEB1B7;\n}\n\n#form-templates .contact__info-background {\n  z-index: -1;\n  position: absolute;\n  top: 20px;\n  left: 20px;\n  width: 100%;\n  height: 100%;\n  border: 1px dashed #ef4557;\n}\n\n\n#form-templates .new-container{\ndisplay: flex;\njustify-content: space-between;\nflex-wrap: wrap;\n}\n\n\n#form-templates{\npadding: 100px 15px 100px 15px;        \n}\n\n#form-templates .contact__info-heading {\n  font-family: 'Sora' !important;\n  font-style: normal !important;\n  font-weight: 400 !important;\n  font-size: 36px !important;\n  line-height: 46px !important;\n  color: #2E2E2E !important;\n   margin-bottom: 60px !important;\n\n}\n\n\n#form-templates .message label{\ncolor: #585858 !important;   \n}\n\n.elementor-widget-container.form-template h2,.elementor-widget-container.form-template h1{\n font-size: 60px !important;\n  line-height: 70px !important;\n  font-family: \"Sora\", Sans-serif;\n  font-weight: 400;\n  margin: 0;  \n  margin-bottom: 20px;\n}\n\n\n\n\n.elementor-widget-container.form-template p{\n  font-family: \"Karla\", Sans-serif;\n  font-size: 22px;\n  font-weight: 400;\n  line-height: 28px;\n  color: var( --e-global-color-primary );\n  max-width: 700px;\n  margin: 0; \n  margin-bottom: 40px;\n} \n  \n\n\n.new-container #spinner{\nwidth: 50%;\nmax-width: 700px;\n}\n\n\n#form-templates .new-container #spinner div.contact-us__wrapper:nth-child(6){\ngap:30px; \n    \n}\n\n\n#form-templates .contact__info-heading {\n  margin-bottom: 67px;\n  font-size: 36px;\n  font-family: karla;\n  color:  #2E2E2E;\n\n  line-height: 49px;\n}\n\n#form-templates .contact__info-steps {\n  display: flex;\n  flex-direction: column;\n  max-width: 425x;\n  row-gap: 20px;\n  border-left: 1px solid #2e2e2e;\n}\n\n#form-templates .contact__info-block {\n  position: relative;\n  padding-left: 45px;\n}\n\n#form-templates .contact__info-block:last-child {\n  box-shadow: -1px 0 0 1px #f4f4f4;\n}\n\n#form-templates .contact__info-step {\n  position: absolute;\n  border: 1px solid #2e2e2e;\n  width: 40px;\n  height: 40px;\n  display: flex;\n  align-items: center;\n  justify-content: center;\n  border-radius: 20px;\n  left: -20px;\n  top: -8px;\n  background-color: #F4F4F4;\n  color:  #2E2E2E;\n\nfont-family: Karla;\nfont-weight: 700;\nfont-size: 18px;\nline-height: 28px;\n\n}\n\n.elementor-widget-global .contact__info-step {\n        color:  #2E2E2E;\n}\n\n#form-templates .contact__info-text {\n  margin: 0;\n  font-size: 16px;\n  line-height: 26px;\n  color: #2E2E2E;\n  font-family: karla;\n\n  width: 100%;\n}\n\n\n#form-templates .contact-us__send{\nflex-shrink: 0;\nmargin-top:0;\n}\n\n\n\n@media screen and (max-width: 1279px) {\n    .new-container #spinner{\n        width: 100%;\n        max-width:100%;\n        margin-bottom:40px;\n    }\n    \n\n    .new-container .contact__info {\n        max-width: 700px !important;\n    }\n    \n}\n\n\n@media screen and (max-width: 1279px) {\n#form-templates{\npadding: 60px 15px 70px 15px;     \n}\n}\n\n\n\n@media screen and (max-width: 767px) {\n\n#form-templates .new-container #spinner div.contact-us__wrapper:nth-child(6){\ngap:20px; \n \n}\n\n\n  #form-templates .contact__info {\n    padding: 20px 20px 40px 40px;\n    margin: 0 auto;\n  }\n\n\n#form-templates{\npadding: 40px 15px 50px 15px;  \n    \n}\n\n  \n   .new-container #spinner{\n       \n    margin-bottom:30px;   \n   }\n   \n   \n   .elementor-widget-container.form-template h2,.elementor-widget-container.form-template h1{\n   font-size: 32px !important;\n    line-height: 42px !important;    \n   }\n   \n   \n   .elementor-widget-container.form-template p{\n       \n    font-size: 16px;\n    line-height: 20px;  \n    margin-bottom: 30px;\n \n       \n   }\n   \n   #form-templates .contact__info-heading{\n   font-size: 24px !important;\n    line-height: 49px !important;    \n       \n   }\n   \n\n.mailToContact{\nmargin-top: 10px !important;        \n}\n   \n\n  #form-templates .contact__info-heading {\n    font-size: 24px;\n    margin-bottom: 37px;\n  }\n\n  #form-templates .contact__info-background {\n    top: 10px;\n    left: 10px;\n  }\n\n  #form-templates .contact__info-text {\n    font-size: 12px;\n    line-height: 20px;\n  }\n  \n  \n  #form-templates .contact__info-heading {\n   margin-bottom: 35px !important;\n\n}\n\n}\n\n@media (max-width: 767px) {\n    .mailToContact {\n        max-width: 100%;\n    }\n}\n<\/style>\n\n<script>\nwindow.addEventListener('hashchange',function(e){if(window.history.pushState){window.history.pushState('','\/',window.location.pathname)}else{window.location.hash=''}})\n<\/script>\n\n\n<div id=\"form-templates\">\n<div class=\"elementor-widget-container form-template\">\n<a name=\"contact-form\"><\/a>\n<h2>Contact us<\/h2>\n<p><a id=\"calendlylink\" style=\"color: #c63031; border-bottom: 1px solid #c63031; padding: 0;\">Book a call<\/a> or fill out the form below and we\u2019ll get back to you once we\u2019ve processed your request.<\/p>\n<\/div>\n\n<div class=\"new-container\">\n\n\n<div class=\"contact-us__main\" id=\"spinner\" data-no-defer=\"1\">\n\n<div class=\"contact-us__wrapper\">\n\n<div class=\"name\">\n<label>Name<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"field_name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required contact-us__name\" id=\"contact-name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name*\" value=\"\" type=\"text\" name=\"field_name\" \/><\/span>\n<\/div>\n\n<div class=\"company\">\n<label>Company<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required contact-us__company\" id=\"contact-company\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Company*\" value=\"\" type=\"text\" name=\"company\" \/><\/span>\n<\/div>\n\n<\/div>\n\n<div class=\"contact-us__wrapper\">\n\n<div class=\"email\">\n<label>Email<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email contact-us__email\" id=\"contact-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Corporate email*\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n<\/div>\n\n<div class=\"phone\">\n<label>Phone<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tel\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel contact-us__phone\" id=\"contact-phone\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone*\" value=\"\" type=\"tel\" name=\"tel\" \/><\/span>\n<\/div>\n\n<\/div>\n<div class=\"contact-us__wrapper subj\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-recipient\"><select class=\"wpcf7-form-control wpcf7-select\" id=\"form-field-subj_js\" aria-invalid=\"false\" name=\"your-recipient\"><option value=\"\">Subject*<\/option><option value=\"IT staff augmentation\">IT staff augmentation<\/option><option value=\"Turnkey product development\">Turnkey product development<\/option><option value=\"Support and enhancement\">Support and enhancement<\/option><option value=\"Careers\">Careers<\/option><option value=\"Other\">Other<\/option><\/select><\/span>\n\n<span class=\"wpcf7-form-control-wrap\" data-name=\"form-field-budget_js\"><select class=\"wpcf7-form-control wpcf7-select\" id=\"form-field-budget_js\" aria-invalid=\"false\" name=\"form-field-budget_js\"><option value=\"\">Project budget<\/option><option value=\"Under $15K\">Under $15K<\/option><option value=\"$15K-$30K\">$15K-$30K<\/option><option value=\"$30K-$100K\">$30K-$100K<\/option><option value=\"$100K-$250K\">$100K-$250K<\/option><option value=\"$250K-$500K\">$250K-$500K<\/option><option value=\"More than $500K\">More than $500K<\/option><\/select><\/span>\n\n<\/div>\n\n\n<div class=\"message\">\n<label>Message<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"message\"><textarea cols=\"40\" rows=\"1\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required contact-us__message\" id=\"contact-message\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Describe your needs in detail*\" name=\"message\"><\/textarea><\/span>\n<\/div>\n\n<div class=\"atvoice-wrap\">\n\n<div class=\"voice-wrap\">\n<span id=\"voice-mut\" class=\"voicetext\">Send us a voice message<\/span>\n         <div class=\"qc_voice_audio_wrapper\">\n            <div class=\"qc_voice_audio_container\">\n                <div class=\"qc_voice_audio_upload_main\" id=\"qc_audio_main\">\n                    <a class=\"qc_audio_record_button\" id=\"qc_audio_record\" href=\"#\" aria-label=\"Record an audio message\">\n                        <span class=\"dashicons dashicons-microphone\"><\/span> \u00a0<\/a> \n                <\/div>\n\n                <div class=\"qc_voice_audio_recorder\" id=\"qc_audio_recorder\" style=\"display:none\">\n\n                <\/div>\n                <div class=\"qc_voice_audio_display\" id=\"qc_audio_display\"  style=\"display:none\">\n                    <audio id=\"qc-audio\" controls src=\"\"><\/audio>\n                    <span title=\"Remove and back to main upload screen.\" class=\"qc_audio_remove_button dashicons dashicons-trash\"><\/span>\n                <\/div>\n            <\/div>\n            <input type=\"hidden\" value=\"\" name=\"qcwpvoicemessage\" id=\"qc_audio_url\" \/>\n        <\/div>\n        \n<\/div>\n\n\n<div class=\"attach-wrap\">\n<span class=\"voicetext\">Attach documents<\/span>\n\n<div class='attachment'>\n\n<div class=\"downloaded\">\n<span><\/span>\n<div class=\"deleteFile\"><\/div>\n<\/div>\n\n<div class=\"attachmentButton\" onclick=\"(function cl(e){if(e.target.nodeName == 'DIV'){e.target.parentNode.children[1].children[0].click(); }})(arguments[0]);\">\n\n<div class=\"innerText\">Upload file<\/div>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"att-files\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-file\" accept=\".jpg,.png,.jpeg,.pdf\" aria-invalid=\"false\" type=\"file\" name=\"att-files\" \/><\/span>\n\n<div class=\"tip\" onclick=\"event.stopPropagation()\">\n<p>You can attach 1 file up to 2MB. Valid file formats: pdf, jpg, jpeg, png.<\/p>\n<\/div>\n\n<\/div>\n\n<\/div>\n\n<\/div>\n\n\n\n<\/div>\n\n<div class=\"contact-us__wrapper\"> \n<p class=\"pp\">By clicking Send, you consent to Innowise processing your personal data per our<a href=\"\/privacy-notice\/\"> Privacy Policy <\/a>to provide you with relevant information. By submitting your phone number, you agree that we may contact you via voice calls, SMS, and messaging apps. Calling, message, and data rates may apply.<\/p>\n\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"scoring_point\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmCampaign\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmContent\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmMedium\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmSource\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmTerm\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"location\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"city\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"ip\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"Summ\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"gclid\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"rating\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"urlCompany\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"urlWithParams\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"audioMessageLink\" \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner contact-us__send\" id=\"contact-send-button\" type=\"submit\" value=\"Send\" \/>\n<\/div>\n\n<div class='mailToContact'>You can also send us your request <\/br>to <a href=\"mailto:contact@innowise.com\">contact@innowise.com<\/a><\/div>\n\n<\/div>\n\n<div class=\"elementor-widget-container\" style=\"z-index:1;\">\n<div class=\"contact__info\">\n  <div class=\"contact__info-background\"><\/div>\n  <div class=\"contact__info-heading\">What happens next?<\/div>\n  <div class=\"contact__info-steps\">\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">1<\/div>\n      <p class=\"contact__info-text\">Once we\u2019ve received and processed your request, we\u2019ll get back to you to detail your\n        project needs and sign an NDA to ensure confidentiality.<\/p>\n    <\/div>\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">2<\/div>\n      <p class=\"contact__info-text\">After examining your wants, needs, and expectations, our team will devise a project\n        proposal with the scope of work, team size, time, and cost estimates.<\/p>\n    <\/div>\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">3<\/div>\n      <p class=\"contact__info-text\">We\u2019ll arrange a meeting with you to discuss the offer and nail down the details.<\/p>\n    <\/div>\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">4<\/div>\n      <p class=\"contact__info-text\">Finally, we\u2019ll sign a contract and start working on your project right away.<\/p>\n    <\/div>\n  <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\n<\/div>\n\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"related_content_blog_container\">[related_content_list]<\/div><script>\n            jQuery( document ).ready(function($) {\n            var parentSection = $('[data-elementor-type=\"wp-page\"]');\n            if($('[data-elementor-type=\"wp-post\"]').length){\n                var parentSection = $('[data-elementor-type=\"wp-post\"]');\n            }\n            \n                parentSection.children().last().before($('.related_content_blog_container'));\n            });\n            <\/script><div class=\"other_services_container\">[need_other_services_v2]<\/div><script>\n                    jQuery( document ).ready(function($) {\n                        var parentSection = $('[data-elementor-type=\"wp-page\"]');\n                        if($('[data-elementor-type=\"wp-post\"]').length){\n                            var parentSection = $('[data-elementor-type=\"wp-post\"]');\n                        }\n                        \n                        console.log(parentSection);\n                        parentSection.children().last().before($('.other_services_container'));\n                        var sections = parentSection.find('.net-15.dt-16');\n                        for(var i = 0; i<sections.length; i++){\n                            if($(sections[i]).hasClass( 'net-15' ) && $(sections[i]).hasClass( 'dt-16' ) && $(sections[i]).hasClass( 'elementor-hidden-desktop' )==false){\n                                $(sections[i]).before($('.other_services_container'));   \n                            }\n                        }\n                        \n                    });\n                <\/script>","protected":false},"excerpt":{"rendered":"<p>The power of data mapping in healthcare: benefits, use cases &#038; future trends. As the healthcare industry and its supporting technologies rapidly expand, an immense amount of data and information is generated. Statistics show that about 30% of the world&#8217;s data volume is attributed to the healthcare industry, with a projected growth rate of nearly [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":182677,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":true,"inline_featured_image":false,"footnotes":""},"categories":[128,1245],"class_list":["post-182675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-siarhei_sukhadolski_author","tag-banking","tag-expert-tips","tag-fintech"],"acf":[],"_links":{"self":[{"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/posts\/182675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/comments?post=182675"}],"version-history":[{"count":0,"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/posts\/182675\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/media\/182677"}],"wp:attachment":[{"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/media?parent=182675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/categories?post=182675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innowise.com\/pt\/wp-json\/wp\/v2\/tags?post=182675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}