Understanding existing ICT risk strategies is the foundation of this workflow. In this task, you will evaluate the current strategies in place and determine their effectiveness. What are the current frameworks utilized? Are they compliant with the latest regulations? This inquiry not only highlights strengths but also reveals gaps needing attention. Accurate identification paves the way for a targeted and efficient assessment of how these strategies align with the Digital Operational Resilience Act (DORA). Potential challenges here include outdated documentation or unclear ownership of strategies. Utilize resources such as policy documents and compliance checklists to aid in your search.