About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

ITDR Won’t Save You if You Can’t Recover – Quest Research

Subscribe to our newsletter

For years, financial institutions have invested heavily in identity security, building layered controls around authentication, access management and threat detection. Yet regulators are increasingly focused on resilience – specifically what happens when those controls fail?

The findings from Quest Software’s recent State of ITDR 2026: prevention and recovery research point to a clear conclusion: while organisations have invested heavily in identity threat prevention and detection, recovery remains the missing resilience element.

Quest’s Vice President of Product Management and Marketing, Rakesh Shah, shared insights with RegTech Insight on this critical missing layer – whether organisations can recover their identity infrastructure quickly, consistently and in a way that satisfies growing regulatory expectations around operational continuity and control effectiveness.

Recovery Is the Regulatory Gap

A consistent theme emerging from Quest’s findings is that most organisations are not failing because they lack detection capability. They are failing because they cannot recover. As Shah observes, many firms have invested in preventive controls and monitoring tools, yet “struggle when identity controls fail,” with recovery readiness often remaining “more theoretical than practical.” Quest research indicates that nearly 80% of organisations remain vulnerable to identity-related threats due to inadequate tooling, while 24% never test disaster recovery and 44% test only annually.

Supervisory frameworks require firms to demonstrate that they can withstand and recover from severe but plausible disruption scenarios. Organisations that regularly test identity recovery not only reduce outage duration but limit business impact, with purpose-built recovery tooling enabling restoration up to 90% faster in some cases. In regulatory terms, that translates directly into reduced breach risk against impact tolerances.

Identity as the Control Plane

Active Directory (AD) is Microsoft’s on-premises directory service that manages user authentication, authorisation and access to network resources. Microsoft Entra ID (formerly Azure Active Directory) is its cloud-based identity and access management platform providing authentication and access control across cloud and hybrid environments. Together, these systems form the control plane through which access to applications, data and services is governed.

When that control plane fails, the consequences extend far beyond IT. Shah notes that identity resilience is no longer a “behind-the-scenes technical function”; when identity fails, “operations stall, regulators step in, and financial and brand damage follow” . Attackers understand this dynamic. Compromise of a single high-privilege identity can enable rapid lateral movement across systems, partners and customer environments.

For regulators, this elevates identity into the category of systemic dependency. Under EU DORA and similar regulatory frameworks, firms are required to map critical dependencies supporting important business services. Identity infrastructure sits at the centre of that map. Failure to secure and recover it is no longer a contained cyber incident; it is a potential operational resilience breach.

Tier 0 Misclassification

One of the most persistent weaknesses identified in Quest’s research is the misunderstanding of “Tier 0” identities – those with the highest level of control over systems and infrastructure. While most organisations can identify obvious privileged accounts such as Domain Administrators, far fewer recognise what Shah describes as “Tier 0 by consequence” identities. These include backup systems, automation tools, synchronisation services and privileged application registrations that effectively hold equivalent control.

The regulatory implications are significant. If firms fail to correctly identify their most critical identity dependencies, they cannot accurately assess or contain risk. The result is an expanded “blast radius” in the event of compromise, where attackers can disable recovery mechanisms and escalate privileges unchecked. In such scenarios, preventive controls become irrelevant because the underlying control structure has already been undermined.

From a resilience standpoint, this represents a failure of dependency mapping and critical asset identification – both core requirements under modern supervisory regimes.

Signal Overload and Limits of Traditional Controls

Compounding the challenge is the rapid expansion of identity environments. Hybrid architectures spanning on-premises systems, cloud platforms and software-as-a-service (SaaS) applications generate vast volumes of identity-related signals. Security teams suffer alert fatigue, facing millions of events across AD, Entra, Microsoft 365 and other platforms . At the same time, non-human identities – service accounts, bots and machine identities – now outnumber human users by a ratio of 82:1.

Traditional monitoring approaches struggle to distinguish material threats from background noise, while a shortage of deep expertise in identity systems further limits effective oversight. Organisations that successfully modernise ITDR do so by correlating signals across environments, reducing noise and introducing automation to support analysis.

Artificial intelligence (AI) is often presented as the solution, and 79% of respondents in Quest’s research believe AI can improve ITDR effectiveness . Yet this introduces a critical dependency on data quality. As Shah highlights, AI-driven decision-making is only as reliable as the data underpinning it. Without structured, governed and trusted identity data, AI risks amplifying rather than reducing control weaknesses. For regulators, this raises questions about explainability and auditability.

From Security Tool to Resilience Lifecycle

Quest’s research indicates that 78% of organisations still cite proactive threat management as the primary driver for ITDR adoption, but this is increasingly complemented by resilience-oriented capabilities.

Shah frames resilience in practical terms: continuous visibility across identities, clear ownership and accountability, automated access reviews, rapid containment of compromised credentials and segmentation to limit lateral movement. Taken together, these elements form a control framework that closely mirrors those used in regulatory compliance, spanning preventive, detective and corrective controls.

Identity as a Strategic Risk

According to Shah, boards and senior executives are now asking fundamentally different questions: can the organisation continue operating under attack? Are AI initiatives introducing unmanaged risk? Are regulatory expectations being met? These are not technical queries. They are questions of risk, accountability and strategic resilience.

This aligns with broader regulatory trends, including senior management accountability regimes and increasing board oversight of operational resilience. Identity, once considered a technical domain, is now central to these discussions. It sits at the intersection of cybersecurity, operational continuity and emerging AI risk, placing it firmly within the scope of supervisory scrutiny.

Conclusion

The trajectory is clear. ITDR is moving beyond its origins in threat detection towards a more expansive role as a resilience control framework. Identity systems underpin critical business services, and their failure carries direct regulatory consequences. Recovery capability, visibility and governance are no longer optional enhancements; they are core requirements for demonstrating compliance and operational continuity.

Subscribe to our newsletter

Related content

WEBINAR

Recorded Webinar: Sponsored by FundGuard: NAV Resilience Under DORA, A Year of Lessons Learned

The EU’s Digital Operational Resilience Act (DORA) came into force a year ago, and is reshaping how asset managers, asset owners and fund service providers think about operational risk. While DORA’s focus is squarely on ICT resilience and third-party dependencies, its implications extend deep into core operational processes that are critical to market integrity, investor...

BLOG

Symphony and the Future of Market Communications: T+1, DORA, and Deepfake Defence

In May 2024, the U.S. capital markets made the long-awaited transition to T+1 settlement, with RegTech company Symphony playing a quiet but pivotal role. The integration of its platform with DTCC’s Central Trade Manager (CTM) gave firms the ability to resolve trade contract breaks in real time, reducing the risk of settlement failure. “The DTCC,...

EVENT

RegTech Summit New York

Now in its 9th year, the RegTech Summit in New York will bring together the RegTech ecosystem to explore how the North American capital markets financial industry can leverage technology to drive innovation, cut costs and support regulatory change.

GUIDE

Regulatory Data Handbook 2025 – Thirteenth Edition

Welcome to the thirteenth edition of A-Team Group’s Regulatory Data Handbook, a unique and practical guide to capital markets regulation, regulatory change, and the data and data management requirements of compliance across Europe, the UK, US and Asia-Pacific. This year’s edition lands at a moment of accelerating regulatory divergence and intensifying data focused supervision. Inside,...