Susan Victor

About Susan Victor

This author has not yet filled in any details.
So far Susan Victor has created 23 blog entries.

Microsoft 365: The Compliance Platform for DORA and NIS2 in the EU

Microsoft 365: The Compliance Platform for DORA and NIS2 in the EU The European Union's regulatory landscape is rapidly evolving, placing stringent cybersecurity and operational resilience demands on countless organisations. The Digital Operational Resilience Act (DORA) and the Network and Information Security 2 (NIS2) Directive represent a seismic shift, forcing entities to move beyond basic security towards a verifiable state of continuous resilience. For many organisations, particularly those leveraging the cloud, the path to compliance runs directly through their existing architecture—specifically, their Microsoft 365 and Azure environments. Microsoft 365, with its integrated security, compliance, and governance tools, is uniquely positioned not just as a productivity suite, but as a foundational platform for European cybersecurity compliance. Successfully navigating the complexities of DORA and NIS2 requires a strategic approach that maps regulatory obligations directly to the technical capabilities within the Microsoft ecosystem. This article explores how organisations can leverage Microsoft 365 and

By |2025-10-06T14:53:31+00:00October 6th, 2025|Blog|0 Comments

Beyond Compliance: Why Data Privacy is the Future of Business

Beyond Compliance: Why Data Privacy is the Future of Business The digital landscape has fundamentally shifted. Data isn't just a core asset; it's the very lifeblood of a business. But with unprecedented data collection comes heightened scrutiny and a critical need for robust data privacy practices. Consumers, now more than ever, are aware of their digital footprint and are demanding transparency, control, and respect for their personal information. The companies that succeed in the coming years will be those that integrate data privacy into their core business strategy, moving beyond mere compliance to build a culture of trust. A 2024 Gartner survey revealed that 85% of consumers would consider taking their business elsewhere if they felt their personal data was being mishandled. This isn't just a legal obligation; it's a competitive advantage. Building customer trust requires a commitment to Privacy by Design, where data protection is a foundational principle from

By |2025-10-08T14:35:28+00:00October 2nd, 2025|Blog|0 Comments

DORA and NIS2 Compliance Gap: Why Microsoft 365 Native Tools Fall Short

DORA and NIS2 Compliance Gap: Why Microsoft 365 Native Tools Fall Short The clock is ticking. For businesses operating across the European Union, a new era of digital security is not just coming—it’s here. Indeed, it's an era defined by two landmark legislative frameworks: the Digital Operational Resilience Act (DORA) and the NIS2 Directive. These are more than just regulatory updates; rather, they represent a fundamental, non-negotiable shift in how organisations must manage their digital infrastructure, protect their data, and, most critically, ensure their operational resilience. The stakes are higher than ever, consequently, with significant penalties for non-compliance and a heightened risk of reputational damage in the event of a breach. For countless organisations, the complexity of these regulations is compounded by their reliance on a single, powerful platform: Microsoft 365. This suite of applications serves as the central nervous system for daily operations, from communication to data storage. So, the question

By |2025-09-29T12:51:14+00:00September 29th, 2025|Blog|0 Comments

Secure Your Business: Five Essential Cybersecurity Tips

Secure Your Business: Five Essential Cybersecurity Tips The notion of a traditional network "perimeter" is a relic of the past. The widespread adoption of cloud-native environments, remote workforces, and the Internet of Things (IoT) has dissolved old boundaries, creating a sprawling, interconnected ecosystem. For CISOs, IT teams, and business leaders, the challenge isn't just protecting a fixed network but safeguarding a dynamic digital identity. The threat landscape is more complex and automated than ever before. Adversaries are weaponising artificial intelligence (AI) to launch hyper-realistic phishing campaigns, craft sophisticated polymorphic malware, and automate the discovery and exploitation of vulnerabilities at a scale previously unseen. The rise of Ransomware-as-a-Service (RaaS) and double / triple extortion schemes has professionalised cybercrime, making it a lucrative and relentless industry. In this reality, relying on outdated security practices is a direct path to catastrophic business failure. The statistics are stark: a significant percentage of small and

By |2025-09-04T11:26:27+00:00September 4th, 2025|Blog|0 Comments

Your Vendors are Your Attack Surface: How to Determine Their Risk Impact

Your Vendors are Your Attack Surface: How to Determine Their Risk Impact The modern enterprise is a web of interconnected systems, and its security is only as strong as its weakest link. More often than not, that weakest link is a third-party vendor. Supply chain attacks, like the ones that have made headlines in recent years, have proven that a vendor's security is a direct reflection of your own. This isn't just about data breaches. A vendor's failure can trigger a domino effect, leading to operational disruptions, reputational damage, and severe financial and regulatory penalties. The challenge for today's cybersecurity teams is to move beyond the traditional, static view of vendor risk and embrace a more dynamic, continuous, and intelligence-driven approach. So, how do you determine the risk impact of a vendor in this hyper-connected world? The Vendor Risk Assessment: A Dynamic Process, Not a One-Time Event A Vendor Risk

By |2025-10-08T14:36:12+00:00August 21st, 2025|Blog|0 Comments

Ransomware: Is Your Strategy Battle-Ready?

Ransomware: Is Your Strategy Battle-Ready? The recent past has been littered with high-profile Ransomware attacks, turning what was once a niche concern into a board-level imperative. From the automotive industry to critical healthcare services, no sector is immune. The question is no longer "if" an attack will happen, but "when." This reality demands a proactive, tried, and tested strategy that goes beyond basic defences. The lack of clear and timely communication during an outage, regardless of the cause, can shatter brand trust and customer confidence. Just as an effective disaster recovery plan is crucial for business continuity, so is a transparent communication strategy to manage public perception and maintain stakeholder trust in the face of a crisis. The Evolving Threat: More Than Just File Encryption Today's Ransomware is a far more sophisticated beast than the crypto- and locker-based attacks of the past. While these two types still exist—crypto-Ransomware encrypting files

By |2025-08-19T06:47:44+00:00August 19th, 2025|Blog|0 Comments

Overe and Elasticito Announce Strategic Partnership to Strengthen Cyber Security for Businesses

Overe and Elasticito Announce Strategic Partnership to Strengthen Cyber Security for Businesses FOR IMMEDIATE RELEASE Overe and Elasticito Announce Strategic Partnership to Strengthen Cyber Security for Businesses LONDON, 13 AUGUST 2025 – Overe, a leading Cloud Detection and Response (CDR) platform for Microsoft 365 security, and cyber risk and threat specialists Elasticito, have announced a strategic partnership to deliver a comprehensive, automated cyber security solution to Elasticito’s customers across the EMEA region. This collaboration will focus on protecting businesses – particularly organisations who are required to comply with NIS 2, DORA and the future UK Cyber Security and Resilience Bill – from threats targeting Microsoft 365. The partnership integrates Overe's automated platform with Elasticito’s expert services, and will add to Elasticito’s Enterprise and MSSP offerings, providing clients with enhanced capabilities for real-time security discovery, hardening, and threat detection. By combining Overe's AI-powered technology for continuous monitoring with Elasticito's deep expertise

By |2025-08-12T14:39:43+00:00August 12th, 2025|Press Release|0 Comments

NIS2 Directive Readiness: Compliance, Challenges & Recommendations

NIS2 Directive Readiness: Compliance, Challenges & Recommendations In this dynamic environment, the NIS2 Directive stands as a pivotal piece of legislation, representing a significant stride forward in bolstering cybersecurity across the European Union. An updated iteration of the original Network and Information Systems (NIS) Directive, NIS2 imposes stricter requirements on a broader spectrum of essential and important entities, aiming to safeguard critical infrastructure from the ever-present and ever-evolving cyber threats. Achieving readiness for NIS2 compliance is not merely a regulatory obligation; it is a strategic imperative for organisations to maintain operational continuity and protect their stakeholders. This article 'NIS2 Directive Readiness: Compliance, Challenges & Recommendations' delves into what NIS2 readiness entails, highlights the key challenges organisations face, and offers actionable recommendations for achieving robust compliance. Understanding NIS2 Compliance The NIS2 Directive significantly expands its scope beyond traditional sectors to encompass a wider array of industries deemed essential for societal functions. This

By |2025-06-10T09:32:55+00:00June 10th, 2025|Blog|0 Comments

How Cyber Risk Ratings Drive DORA Compliance in 2025

How Cyber Risk Ratings Drive DORA Compliance in 2025 In the dynamic digital landscape of 2025, the drumbeat of cyberattacks continues to intensify, pushing regulatory bodies to fortify critical sectors. The European Union, recognising the existential threat posed to its financial stability, has introduced the Digital Operational Resilience Act (DORA). This groundbreaking legislation, now a cornerstone of European financial security, aims to ensure that banks, insurance companies, investment firms, and their vital third-party ICT providers can withstand and swiftly recover from severe operational disruptions. For cybersecurity specialists, understanding and leveraging modern tools to achieve DORA compliance is paramount. DORA is more than just another regulatory hurdle; it's a unified commitment to operational resilience across the entire EU financial system. With the power to impose steep penalties—up to 1% of average daily worldwide turnover for non-compliance—DORA demands a proactive and comprehensive approach to risk management, rather than a reactive "minimum viable

By |2025-05-30T12:10:23+00:00May 30th, 2025|Blog|0 Comments

The Digital Operational Resilience Act: Essential Guide – Part 2

The Digital Operational Resilience Act: Essential Guide - Part 2 The European financial sector faces increasing cyber threats and operational disruptions. Consequently, the sector is now subject to the Digital Operational Resilience Act (DORA). This article, the second part of our essential guide, follows our initial overview of DORA in "Digital Operational Resilience Act: Essential Guide - Part 1". We now delve into the specific technical cybersecurity requirements and controls mandated by DORA. Our exploration will cover critical aspects including encryption, access control, network segmentation, real-time monitoring and threat detection systems. Financial entities must implement these systems to strengthen their digital defences. Furthermore, this article highlights the often-overlooked importance of contractual clauses with ICT providers. It also addresses the necessary resource allocation for testing and reporting as financial institutions actively navigate DORA compliance in 2025. DORA Cyber Security Requirements & Technical Controls DORA's technical security requirements establish prescriptive standards financial

By |2025-05-09T13:33:17+00:00May 9th, 2025|Blog|0 Comments