Download Whitepaper

We collaborate with best-in-class platforms, consultants, and technology providers to deliver seamless, future-proof solutions, built to grow with your organization.

Incident Management under DORA: What Risk and Compliance Leaders Need to Rethink

Phuong Pham
December 30, 2025
5 min read
cyber security

For risk and compliance leaders, incident management has never been optional. What DORA changes is not ownership, but expectation. Supervisors are no longer interested in whether incidents are registered. They want evidence that organisations understand what drives incidents, respond consistently, and learn structurally.

That shift requires a different way of organising incident management.

*This article is based on the webinar How to Strengthen Your Incident Management for DORA and Beyond. Access the webinar recording here.

The Reality Behind Today’s Incident Landscape

Operational risk data across European banks shows a clear pattern. Cyber risk and data security remain the dominant incident drivers, followed by IT failures, outsourcing, conduct and legal risk, and fraud. These are not isolated categories. They are symptoms of increasingly complex operating models where technology, third parties, and regulatory pressure intersect.

For risk leaders, this matters because it reinforces a key point from the webinar: incident management cannot be treated as a reactive process that starts after something goes wrong. It must be designed with the dominant risk drivers in mind and embedded into daily operations.

Incident Management Starts With a Clear, End-to-End Process

Effective incident management is not a single action. It is a structured lifecycle that starts the moment something deviates from normal operations and only ends when learninghas been embedded.

In practice, this lifecycle consists of eight connected steps:

  • Incident logging
  • Categorisation
  • Prioritization
  • Routing and assignment
  • Creating and managing improvement actions
  • SLA management and escalation
  • Resolution
  • Closure
    Each step serves a governance purpose. Skipping or weakening any of them creates blind spots that typically surface during audits, incidents, or regulatory reviews.

A deliberate design choice highlighted in the webinar is to keep reporting thresholds low. Anyone should be able to report an incident easily, often via mobile devices. This can lead to multiple notifications for a single event, but consolidation belongs in the assessment phase. Early visibility is always preferable to filtered silence.

Access the webinar recording and presentation .

Root-Cause Analysis Is Where Control Becomes Visible

An incident on its own explains very little. The real value lies in understanding why it happened.

This starts with basic risk management questions:

  • Was the risk already identified?
  • Did a control fail, or was it not in place?
  • Was the cause human, technical, third-party related, or organisational?

Structured root-cause methodologies such as fishbone analysis, bow-tie analysis, fault-tree analysis, or the five-whys technique help move beyond symptoms. They force organisations to distinguish between primary and secondary causes and to avoid superficial conclusions.

Equally important is learning. Linking incidents to other reported events and building a library of lessons allows patterns to emerge. Over time, this transforms incident management from reactive handling into proactive risk insight.

Why DORA Places Incident Management at the Centre

DORA does not primarily aim to increase reporting obligations. Its core objective is to protect the continuity of critical financial services.

Supervisors are concerned about systemic risk. Thousands of financial institutions rely on interconnected ICT systems, cloud providers, and third parties. A major disruption at one point in the ecosystem can quickly cascade across organisations.

This explains why DORA places explicit requirements on incident classification, escalation, and regulatory reporting. These requirements are not administrative in nature. They are designed to ensure institutions understand which incidents threaten critical services and respond accordingly.

What MN’s Experience for DORA Shows in Practice

The experience of MN, one of the largest pension asset managers in the Netherlands, illustrates how these principles are applied in practice.

As part of its DORA programme, MN treated incident management as a dedicated workstream. The starting point was not tooling, but a gap analysis between existing policies and processes and the new regulatory requirements. Based on this analysis, MN adjusted its incident policy and introduced new incident types required under DORA. Watch the recording how MN design their DORA program .

Only after this ground work did MN adapt its incident management tooling, introduce organisation-wide training and awareness through e-learning, and put reporting formats in place for regulatory reporting to the AFM.

This sequencing reflects a conscious leadership choice. Process clarity, roles, and accountability came before automation.

Low Threshold Reporting as a Leadership Choice

One of the important choices MN made was to allow every employee to report incidents easily.

From a risk leadership perspective, this is a trade-off. Lower thresholds lead to more reports and more work during assessment. At the same time, they reduce surprises and improve early detection. Consolidation and prioritisation take place later, under the responsibility of the second line.

This approach aligns closely with DORA’s intent and highlights the role of risk and compliance leaders in shaping reporting culture, not just control frameworks.

Incidents Rarely End Where They Start

Another lesson reinforced during the webinar is that incidents rarely remain confined to a single process or department.

At MN, incidents are assessed centrally by the second line, classified consistently, and communicated to internal stakeholders and clients based on severity. Medium and high incidents trigger board-level visibility and clear timelines.

This cross-functional view is essential. Without it, organizations fix local issues while systemic weaknesses remain untouched.

Crisis First, Documentation Second

MN’s experience with major ICT incidents also highlights an important reality.

In crisis situations, the priority is response and coordination. Restoring services and limiting impact come first. Documentation and regulatory reporting follow once stability has been restored.

For risk and compliance leaders, this nuance matters. DORA does not expect perfect form completion during a crisis. It expects timely judgement, clear ownership, and well-documented reasoning afterward. Systems should support this sequence, not work against it.

Incident Management as a Learning Discipline

What ultimately differentiates mature organisations is not how quickly incidents are closed, but how consistently lessons are embedded.

At MN, incidents are explicitly linked back to risks, controls, and improvement actions. Root-cause analysis is not treated as a formality, but as a way to challenge whether risks were underestimated or controls were ineffective.

This is where incident management becomes strategic. It feeds continuous improvement rather than periodic reporting.

https://www.cerrix.com/en/events/strengthening-your-incident-management-for-dora-and-beyond

A Question Risk and Compliance Leaders Should Be Asking

DORA may be the immediate driver, but it exposes a broader question.

Do incidents in your organization lead to structural learning, or do they disappear once they are closed?

Risk and compliance leaders are uniquely positioned to influence the answer. Not by owning the incident register, but by shaping how incidents are interpreted, escalated, andused to strengthen resilience over time.

That is the real shift DORA brings.

DORA Compliance is niet alleen een deadline: leg de basis voor uw veerkracht op lange termijn

Share this post

Related content

cyber security

Incident Management under DORA: What Risk and Compliance Leaders Need to Rethink

Incident Management under DORA: What Risk and Compliance Leaders Need to Rethink

risk treatment

Hoe u ISO 31000 Risicobehandeling in de Praktijk Toepast: Inzichten voor Risk- en Complianceleiders

A practical recap of CERRIX ISO 31000 risk treatment webinar

Hoe Wij CERRIX GRC Gebruiken voor het Beheren van Ons ISMS. ISO 27001 in de Praktijk

Wij gebruiken onze eigen CERRIX GRC-software om het ISMS van CERRIX te beheren. Zo maken we van compliance een continu proces en laten we zien hoe ISO 27001 onderdeel wordt van de dagelijkse praktijk.

Hoe bereken je risicokans en -impact?

Leer hoe je risicokans en -impact berekent volgens ISO 31000. Ontdek hoe gestructureerde risicobeoordeling, scoringsmodellen en risicomatrices bijdragen aan effectief risicomanagement met CERRIX.

Why the Three Lines of Defense Model Is Outdated? What Every Board Should Know About the Three Lines Model

Three Lines Model Explained: Why Boards Must Move Beyond 3LOD

What Is ISO 31000 and How Does It Work?

Discover what ISO 31000 is, how it works, and why it’s essential for risk management in 2025. Learn the principles, framework, and how tools like CERRIX help organizations turn ISO 31000 into practice.

How to Write an Incident Report That Stands Up to Audits

Learn how to write incident reports that are clear, evidence-backed, and audit-ready. Includes a template, best practices, and compliance alignment for risk professionals.

How to Implement ISO 31000: Real-Time Risk Decisions with AI‑Enabled Tools

Discover how to move beyond compliance and operationalize ISO 31000 using AI, real-time dashboards, and structured risk assessments. Learn from webinar insights and best practices tailored for financial services and regulated industries.

compliance team looking for ISMS

What’s Blocking Your ISMS Rollout? 7 Fixable Challenges for Financial Institutions

Discover the 7 biggest blockers in ISMS rollout for financial institutions—and how to solve them. Learn practical strategies to secure buy-in, define scope, streamline controls, and prepare for ISO 27001 certification.

working compliance manager

Trends Driving ISMS Adoption in 2025: What Risk & Compliance Leaders Need to Know

Discover the top trends pushing organizations toward ISMS adoption in 2025—from regulatory changes and remote work to threat evolution and AI. Learn what to prioritize to stay ahead in risk and compliance.

ISMS

What Is an ISMS? A Practical Guide for Risk & Compliance Leaders in 2025

An Information Security Management System (ISMS) is more than policy—it’s your organization’s shield against evolving threats, regulation, and reputation risk. Discover what ISMS means, how to implement it, and why it matters in 2025.

AI in GRC

The Intelligent Future of GRC: How AI is Reshaping Governance, Risk & Compliance in 2025

Explore how AI is transforming GRC in 2025—from predictive insights and automation to ethical oversight. Learn what features matter, what risks to manage.

How Do You Implement an ISMS in Financial Services Without Slowing Down Innovation?

Implementing an ISMS in financial services? Explore a practical, risk-aligned roadmap tailored for banks, fintechs, and insurers to meet ISO 27001, GDPR, and DORA compliance—without compromising agility.

How Do You Build a Robust ISMS Framework Based on ISO 27001?

Learn how to build a robust ISMS framework aligned with ISO 27001. Discover the key components—people, policies, processes, and controls—to strengthen security and achieve compliance.

When to Conduct Risk Assessments: 6 Enterprise-Critical Moments

Learn when to conduct risk assessments—annual, quarterly, after incidents or change—and how CERRIX ensures continuous compliance.

How do you build a system of quality management that works under ISQM 1?

Learn how to build a system of quality management under ISQM 1. Move beyond compliance to an operational model that proves audit quality.

Top GRC Platforms Compared: Risk Assessment Tools for 2025

Discover the top GRC platforms for 2025 with a focus on risk assessment tools.

What Are Risk Scoring Methods for Financial Institutions? [2025 Guide]

From Risk Assessment to Risk Management: Moving Beyond Checklists in 2025

Understand the evolution from risk assessment to strategic risk management in 2025. Learn why leading organizations are embedding risk into decision-making—and how GRC platforms like CERRIX support this shift.

What is risk management? A strategic guide for leaders in 2025

How Audit Firms Embed ISQM into Daily Practice

In our second ISQM webinar, experts from RSM, Grant Thornton, and CERRIX shared practical insights on how audit firms can embed ISQM into the heart of their operations.

Embedding ISQM 1 into the DNA of Your Audit Firm: A Risk-Based Approach to Quality Management

Discover how to implement ISQM 1 with a risk-based approach. Learn how audit firms can embed quality management into daily operations and governance.

CERRIX User Conference 2025

Op 12 maart 2025 kwamen marktleiders, verzekeringsexperts en CERRIX-klanten samen voor de CERRIX User Conference 2025, een dag van kennisuitwisseling, inzichtelijke discussies en samenwerking over de toekomst van risicobeheer, compliance en AI-gestuurde GRC-oplossingen.

Van spreadsheets tot GRC-software: waarom pensioenfondsen een moderne benadering van risicobeheer nodig hebben

CERRIX en BR1GHT versterken langdurige samenwerking om oplossingen voor bestuur, risico, compliance en audit te verbeteren

DORA implementeren: van compliance tot veerkracht op lange termijn

Gebruik van GRC-software: uitdagingen overwinnen en succes behalen op het gebied van compliance