
KSC (NIS2) and DORA significantly raise cybersecurity requirements for organizations, especially in risk management, incident reporting, resilience testing, and management accountability. While KSC applies broadly across critical sectors and DORA focuses on the financial sector, both regulations require mature processes, skilled people, and modern technologies. Effective compliance and real cyber resilience depend on combining tools such as EDR, SSE, CTEM, and Red Team testing with continuous staff training and strong involvement of management.
This article is based on the webinar “KSC and DORA: How to Prepare for the New Requirements in 3 Steps?”. Download the full recording here.
New regulations aimed at ensuring a high level of cybersecurity—namely the amendment to the National Cybersecurity System Act (UoKSC) and the DORA regulation on digital operational resilience in the financial sector—require organizations to thoroughly review and strengthen their IT security measures.
Effective cyber resilience is supported primarily by modern technologies and the continuous development of the competencies of people responsible for incident management.
In the article below, we discuss the differences and similarities between KSC and DORA, the cybersecurity challenges they address, and which technologies and processes are worth adopting to meet the new requirements.
The amendment to the National Cybersecurity System Act introduces the requirements of the NIS2 Directive, which further specifies and tightens previous cybersecurity regulations. It mandates systematic and in-depth risk analysis and introduces new incident response mechanisms.
The requirements set out in the UoKSC can be divided into four categories:
DORA (Digital Operational Resilience Act) imposes new, unified, and consistent cybersecurity requirements on organizations operating in the financial sector (e.g. banks, investment firms, insurance and reinsurance companies) as well as their key ICT service providers.
The key areas emphasized by DORA include:
Both DORA and the amendment to the KSC aim to strengthen cybersecurity and digital resilience by imposing obligations related to ICT risk management, incident reporting, and resilience testing.
They differ primarily in scope: DORA applies to the financial sector and its ICT providers, while KSC has a broader reach, covering key sectors of the economy (e.g. energy, transport, public administration).
DORA is also more detailed than NIS2, as evidenced by the introduction of RTS (Regulatory Technical Standards), which further define how to:
By consolidating obligations from previous regulations, DORA harmonizes standards across the European Union and enforces a more holistic approach to ICT cybersecurity. NIS2, on the other hand, gives Member States more flexibility in implementation, requiring adaptation to national legal systems.
When implementing KSC and DORA requirements, organizations must address key cybersecurity challenges, including:
The impossibility of fully blocking attacker access – even with strong controls, there is always a risk of initial access to a low-privilege system (e.g. an endpoint or edge device) before a full ransomware attack unfolds.
Cooperation with third parties – external vendors with network access (e.g. via VPN) can introduce risk due to limited control over their security posture.
Diverse threat sources – malware embedded in commonly used applications, weak service account passwords, and highly privileged user systems (e.g. developers, IT admins).
Unknown vulnerabilities and zero-day exploits – even fully patched systems can be compromised through previously unknown flaws, often targeting VPN devices first.
Human error – misconfigurations, privilege mismanagement, or a single successful phishing attempt can still lead to incidents.
Patch and vulnerability management limitations – patching alone is insufficient; Red Team testing is often required to uncover real-world weaknesses.
Lack of advanced tools – legacy security solutions are no longer sufficient; modern technologies such as EDR or SSE are required.
Insufficient staff training – organizations often lack hands-on incident response training based on real tools and scenarios.
Lack of comprehensive system testing – focusing only on public-facing apps is inadequate; regulations require regular, end-to-end testing of production systems.
To effectively meet KSC and DORA requirements, organizations should consider implementing the following technologies:
Continuous Threat Exposure Management (CTEM)
Security Service Edge (SSE)
Endpoint Detection and Response (EDR)
Red Teaming and penetration testing
Forensics tools
KSC and DORA clearly define the role of employees and management in cybersecurity governance:
Mandatory staff training – organizations must train employees to manage cyber risk and respond effectively to incidents.
Technology combined with skills – advanced tools such as EDR must be complemented by skilled personnel; AI-driven technologies reduce human error, while experience increases effectiveness.
Management responsibility – mandatory management training ensures leadership engagement and accountability for cybersecurity initiatives.
Incident response readiness – real incidents require involvement from application, network, and database administrators; training should be practical and scenario-based.
About the author:
Dr. Eng. Mariusz Stawowski, CTO, CLICO
Has over 20 years of experience in managing cybersecurity projects, penetration testing, and red team operations. Responsible for CLICO’s business strategy development. Holds offensive and defensive certifications including CISSP, CCISO, OSEP, OSCP, and ISO 27001 Auditor. Certified instructor for ISC2 and EC-Council. Earned a PhD in technical sciences at the Military University of Technology in Warsaw for work in network security analysis and design. Author of numerous IT publications and six books on cybersecurity.
