Technical

Information Sharing (Cyber Threat Intelligence)

The exchange of threat intelligence, vulnerability information, and best practices between organizations and authorities. DORA Article 45 encourages financial entities to participate in information sharing arrangements to improve collective cybersecurity resilience.

Information sharing is the fifth pillar of DORA, recognizing that individual organizations benefit from collective threat intelligence. By sharing information about cyber threats, vulnerabilities, and attack techniques, financial entities can better prepare for and respond to emerging threats.

DORA Article 45 establishes a framework for voluntary information sharing among financial entities, subject to appropriate safeguards. Shared information may include indicators of compromise (IoCs), tactics, techniques and procedures (TTPs), security alerts, and configuration tools. Organizations must ensure that information sharing respects confidentiality, protects personal data, and doesn't compromise competitive positions.

Effective information sharing typically operates through sector-specific Information Sharing and Analysis Centers (ISACs), bilateral agreements between organizations, regulatory sharing mechanisms, and threat intelligence platforms. For the European financial sector, organizations like the European Financial ISAC (FI-ISAC) facilitate structured information exchange.

Learn More

Discover how Matproof can help you achieve Information Sharing (Cyber Threat Intelligence) compliance.

View framework page

Automate compliance with Matproof

DORA, SOC 2, ISO 27001 — get audit-ready in weeks, not months.

Request a demo