IT training in the banking sector is not just an investment in competencies – it is a fundamental element of security strategy, regulatory compliance and competitiveness. Banks in 2026 operate in an environment of unprecedented complexity: growing cyber threats, new EU regulations (DORA, NIS2), pressure on digital transformation and, simultaneously, a shortage of qualified IT specialists. For IT and L&D managers in the financial sector, the question is not “should we train”, but “how to train effectively with limited budgets and time”.
This article answers the most important questions: what IT competencies are crucial for banks, how to plan a training programme compliant with regulatory requirements, which trainings are worth conducting in a closed formula, and how to ensure measurable return on investment in team development. If you are responsible for competency development in a bank or work with financial institutions – you will find practical guidance here based on experience from projects for Polish and international banks.
Quick navigation:
- Specific requirements for IT training in the banking sector
- Regulatory requirements: DORA, NIS2, KNF, GDPR and their impact on training programmes
- Key training areas: cybersecurity, cloud, DevSecOps, data, AI
- Training for different roles in the bank: developers, operators, management, compliance
- Closed vs open training – what to choose for a bank?
- How to plan an annual training programme compliant with KNF requirements
- Funding and budgeting training in the financial sector
- How EITT supports banks in developing IT competencies
- FAQ: answers to frequently asked questions
Why do IT trainings in banks require a special approach?
IT training in the banking sector differs fundamentally from training in other industries. It is not enough to teach the team a new technology – you need to do it in the context of specific regulatory requirements, security policies and operational risk characteristic of financial institutions.
Four key factors differentiating IT training for banks:
1. Regulations and audits Banks are subject to continuous supervision by the Polish Financial Supervision Authority (KNF) and internal and external audits. Every training must be:
- Documented (certificates, agendas, attendance lists)
- Compliant with security policies
- Reportable for compliance purposes
- Aligned with DORA, NIS2, GDPR requirements
In practice, this means that an “off the shelf” training catalogue rarely fits a bank without modification. The trainer must understand the regulatory context and relate the content to real requirements that the team faces.
2. Security and confidentiality Training in banks often touches on sensitive topics:
- Architecture of banking systems
- Security procedures
- Customer data handling processes
- Incident response scenarios
The trainer must have qualifications in cybersecurity, understand the specifics of high-security environments and be able to conduct workshops without disclosing sensitive information. For this reason, many banks prefer closed training with a signed NDA.
3. Technological complexity The technology stack in a bank is often a mix of:
- Legacy systems (COBOL, mainframe) maintained for decades
- Modern cloud-native solutions (Kubernetes, microservices)
- Core banking systems (Temenos, Finastra, Flexcube)
- External integrations (SWIFT, ELIXIR, payment gateways)
The IT team in a bank must operate in this hybrid world. Training must take this into account – you cannot teach Kubernetes in isolation from the reality that the bank has 60% of workloads on-premise and cannot move them to the cloud overnight.
4. Time pressure and team availability Banking systems operate 24/7. IT teams often work on a shift basis, support critical business processes and have limited time flexibility. A standard 3-day off-site training is often an organisational problem.
For this reason, banks increasingly choose:
- Modular training – breaking down the programme into shorter sessions (4x 4h instead of 2x 8h)
- Hybrid formats – part online (theory), part on-site (hands-on)
- Weekend training – for production teams
- Train-the-trainer – training internal experts who then train teams
What regulatory requirements affect the IT training programme in banks?
Banks operate in one of the most regulated sectors of the economy. In 2026, there are four key legal frameworks that directly affect training requirements for IT teams:
DORA (Digital Operational Resilience Act)
Entered into force: 17 January 2025 Applies to: All financial institutions in the EU (banks, insurers, investment firms)
DORA is an EU regulation enforcing digital operational resilience of financial institutions. The most important areas for IT training:
| DORA area | Requirement for IT team | Type of training |
|---|---|---|
| ICT risk management | Team must identify, classify and report IT risk | Risk management, ISO 27001 |
| Resilience testing | Regular penetration testing, chaos engineering | Ethical hacking, security testing |
| Incident management | Incident response procedures, reporting to KNF within 24h | Incident response, SOC procedures |
| ICT vendor management | Due diligence towards cloud and SaaS vendors | Vendor risk management |
| Threat-led penetration testing (TLPT) | Red team vs blue team exercises | Advanced pentesting, threat intelligence |
Practical impact: The bank must document that the IT team has undergone training in incident response, threat modelling and vendor risk management. Recommendation: at least once a year for key IT staff.
NIS2 (Network and Information Security Directive 2)
Entered into force: 17 October 2024 (transposition into Polish law) Applies to: Essential entities – including banks
NIS2 imposes on banks the obligation to implement cybersecurity at the level of the entire organisation. Key for training:
Article 20 NIS2 – Management obligations:
- Bank management is personally responsible for cybersecurity
- Requires training for C-level (not only IT)
- Mandatory: cyber risk awareness, incident management, business continuity
Article 21 NIS2 – Risk management:
- Security policies
- Employee training (security awareness)
- Vulnerability management
- Encryption and multi-factor authentication
Practical impact: Every bank employee must undergo at least security awareness training once a year. IT teams must additionally undergo technical training in vulnerability management, encryption, zero trust.
KNF recommendations on operational risk management
Document: Recommendation D (2013) + updates Scope: IT security, change management, IT outsourcing
KNF requires from banks:
- IT change management – controlled deployments, rollback procedures
- System testing – unit tests, integration tests, UAT
- Backup and disaster recovery – regular recoverability tests
- Segregation of duties – separation of dev/test/prod environments
Practical impact: IT teams must know ITIL, DevOps, continuous delivery methodologies from a compliance perspective. Training must take into account the specifics of the regulated sector.
GDPR – IT perspective
Entered into force: 25 May 2018 Applies to: Every organisation processing personal data of EU citizens
For IT teams in banks, GDPR is not just a topic for the legal department. Key technical areas:
- Privacy by design – designing systems with data protection from the ground up
- Data minimisation – storing only necessary data
- Right to erasure – implementation of data deletion mechanisms
- Data breach notification – obligation to report breach to UODO within 72h
- Pseudonymisation and anonymisation – data protection techniques
Practical impact: Developers of banking applications must understand Privacy by Design, zero-knowledge architectures, secure coding practices in the context of GDPR.
Table: IT training required by regulations
| Regulation | Frequency | Target group | Example trainings |
|---|---|---|---|
| DORA | Minimum once a year | IT security, DevOps, architects | Incident response, Threat modelling, Pentesting |
| NIS2 | Once a year (awareness), every 2 years (tech) | All employees (awareness), IT (technical) | Security awareness, Vulnerability management, Encryption |
| KNF | According to bank policy | IT operations, DevOps | ITIL, Change management, DR planning |
| GDPR | Once a year (awareness), every 2 years (tech) | All employees, developers | GDPR compliance, Privacy by design, Secure coding |
What IT training areas are key for the banking sector?
Based on the analysis of needs of over 20 financial institutions in Poland (commercial banks, cooperative banks, payment institutions), we have identified 5 priority training areas for 2026-2027:
1. Cybersecurity and IT risk management
Why is this a priority: Banks have seen a 340% increase in ransomware attacks in 2023-2025 (CERT Poland data). Each security incident costs an average of 18 million PLN (IBM Cost of Data Breach Report 2025).
Key trainings:
Security Fundamentals for all IT
- Threat modelling (STRIDE, DREAD)
- Security testing (SAST, DAST, SCA)
- Secure coding practices (OWASP Top 10)
- Incident response procedures
- Duration: 2 days
- Level: Basic/Intermediate
Advanced Penetration Testing
- Red team vs Blue team exercises
- Threat-led penetration testing (TLPT according to DORA)
- Social engineering simulations
- Post-exploitation techniques
- Duration: 5 days
- Level: Advanced
- Requirement: experience in security
Zero Trust Architecture
- Designing zero trust architecture
- Implementing micro-segmentation
- Identity and Access Management (IAM)
- Network security (ZTNA, SASE)
- Duration: 3 days
- Level: Intermediate/Advanced
Security Operations Centre (SOC)
- SIEM configuration (Splunk, Elastic Security)
- Threat hunting techniques
- Playbook development
- Incident triage and response
- Duration: 4 days
- Level: Intermediate
Practical application: A medium-sized bank (5000 corporate clients) trained a 12-person IT team in Zero Trust Architecture. After 6 months, it reduced the number of security incidents by 60% and received a positive opinion from KNF auditors regarding network segmentation.
2. Cloud computing and cloud migration
Why is this a priority: 63% of banks in Poland plan to migrate part of their systems to the public cloud by 2027 (PRNews.pl report, 2025). However, only 25% of IT teams have practical experience with the public cloud.
Challenges for banks:
- KNF regulations on outsourcing (recommendation H)
- Data residency requirement (customer data in Poland/EU)
- Cloud integration with legacy systems
- FinOps – cloud cost optimisation
Key trainings:
AWS/Azure/GCP for the financial sector
- Cloud compliance (GDPR, DORA, NIS2)
- Landing zone setup for regulated industries
- Hybrid cloud architectures
- FinOps best practices
- Duration: 4 days (per cloud provider)
- Level: Intermediate
Kubernetes for banks
- Container security (Pod Security Standards, OPA)
- Secrets management (HashiCorp Vault, AWS Secrets Manager)
- Network policies and service mesh
- Disaster recovery in Kubernetes
- Duration: 3 days
- Level: Intermediate/Advanced
Cloud Security Posture Management (CSPM)
- Monitoring compliance in the cloud
- Automated remediation
- Cloud security tools (Wiz, Prisma Cloud, Defender for Cloud)
- Multi-cloud security strategy
- Duration: 2 days
- Level: Intermediate
Practical application: A cooperative bank from the region trained an 8-person team in AWS + Kubernetes. After a year, it migrated 30% of workloads to the cloud, reducing infrastructure costs by 40% whilst simultaneously increasing availability to 99.95%.
3. DevSecOps and security automation
Why is this a priority: Banks implement an average of 200-500 changes in production systems per month. Without security automation in the CI/CD pipeline, the risk of introducing vulnerabilities is high.
Key trainings:
DevSecOps Foundation
- Security in CI/CD pipeline
- Infrastructure as Code security (Terraform, CloudFormation)
- Container scanning (Trivy, Grype, Snyk)
- Compliance as Code (OPA, Sentinel)
- Duration: 3 days
- Level: Intermediate
GitOps and Continuous Deployment
- GitOps workflows (ArgoCD, Flux)
- Blue-green deployments in a regulated environment
- Rollback strategies
- Audit trail and compliance reporting
- Duration: 2 days
- Level: Intermediate
Secrets Management
- Vault setup and best practices
- Dynamic secrets
- Certificate management
- Secrets rotation automation
- Duration: 1 day
- Level: Basic/Intermediate
Practical application: A commercial bank implemented DevSecOps practices after training a 15-person team. It automated security scanning in the pipeline, which allowed detecting 200+ vulnerabilities before production deployment in the first year.
4. Data engineering and AI in banking
Why is this a priority: Banks process petabytes of transactional data, which are a goldmine for analytics, fraud detection, personalisation and AI. However, 70% of banks do not have dedicated data engineers (Deloitte report, 2025).
Challenges for banks:
- Data governance compliant with GDPR and KNF regulations
- Data integration from multiple sources (core banking, CRM, payment systems)
- Real-time analytics for fraud detection
- Ethical and secure use of AI
Key trainings:
Data Engineering for banks
- Data pipeline architecture (Kafka, Airflow, Spark)
- Data quality and observability
- Data governance frameworks
- GDPR compliance in data processing
- Duration: 4 days
- Level: Intermediate/Advanced
Machine Learning for fraud detection
- Supervised learning (classification)
- Anomaly detection (unsupervised)
- Model explainability (SHAP, LIME)
- AI Act compliance
- Duration: 5 days
- Level: Advanced
- Requirement: knowledge of Python, SQL
SQL and Python for analysts
- Advanced SQL (window functions, CTEs)
- Python for data analysis (pandas, numpy)
- Data visualisation (matplotlib, plotly)
- Statistics basics
- Duration: 3 days
- Level: Basic/Intermediate
Practical application: A regional bank trained a 6-person team in data engineering and ML. It built a fraud detection system that detects 85% of suspicious transactions in real time, reducing losses by 3 million PLN annually.
5. Compliance, governance and risk management
Why is this a priority: DORA, NIS2, AI Act – banks must meet a wave of new regulations. IT teams must understand not only technology but also legal and business context.
Key trainings:
DORA in practice for IT
- Interpretation of DORA requirements
- ICT risk management framework
- Incident reporting procedures
- Third-party risk management
- Duration: 1 day
- Level: Basic (for all IT)
NIS2 for team leaders and architects
- Cyber risk management
- Business continuity planning
- Supply chain security
- Reporting to regulatory bodies
- Duration: 1 day
- Level: Basic/Intermediate
ISO 27001 Lead Implementer
- Designing ISMS (Information Security Management System)
- Risk assessment methodology
- Controls implementation
- Internal audit
- Duration: 5 days + exam
- Level: Advanced
AI Act for banks
- AI system classification (high-risk vs minimal-risk)
- AI governance framework
- Bias testing and explainability
- Documentation requirements
- Duration: 1 day
- Level: Basic/Intermediate
Practical application: A bank with a network of 150 branches trained the IT leadership team (12 people) in DORA and NIS2. It built a compliance roadmap that passed the KNF audit without critical remarks.
What IT training do different roles in the bank need?
Not everyone in the bank needs the same training. An effective training programme must take into account different roles and their specific needs:
Developers and software engineers
Typical roles: Software Developer, Backend Engineer, Frontend Engineer, Full-Stack Developer
Priority competencies:
- Secure coding practices (OWASP Top 10, CWE Top 25)
- Privacy by design (GDPR in code)
- API security (OAuth 2.0, JWT, rate limiting)
- Cloud-native development (Kubernetes, microservices)
- DevSecOps practices (security in CI/CD)
Recommended trainings:
- Secure Coding for Banking Applications – 3 days, intermediate
- Microservices Architecture & API Security – 4 days, intermediate
- Kubernetes Developer – 3 days, intermediate
- Privacy by Design – 1 day, basic
Frequency: At least 2 technical trainings per year + 1 security awareness
Operations teams (DevOps, SRE, Ops)
Typical roles: DevOps Engineer, Site Reliability Engineer, System Administrator, Cloud Engineer
Priority competencies:
- Infrastructure as Code (Terraform, Ansible)
- Kubernetes operations and security
- Monitoring and observability (Prometheus, Grafana, ELK)
- Incident response and disaster recovery
- Cloud cost optimisation (FinOps)
Recommended trainings:
- Kubernetes Administration – 4 days, intermediate/advanced
- Terraform for regulated institutions – 2 days, intermediate
- Site Reliability Engineering – 3 days, advanced
- Incident Response for IT Operations – 2 days, intermediate
Frequency: 2-3 technical trainings per year, focus on practical hands-on
Security and compliance teams
Typical roles: Security Analyst, Security Engineer, Compliance Officer, Risk Manager
Priority competencies:
- Penetration testing and ethical hacking
- SIEM operations (Splunk, Elastic, QRadar)
- Threat intelligence
- Compliance frameworks (ISO 27001, DORA, NIS2)
- Risk assessment methodology
Recommended trainings:
- Advanced Penetration Testing – 5 days, advanced
- SOC Analyst Training – 4 days, intermediate
- ISO 27001 Lead Auditor – 5 days + exam, advanced
- DORA Implementation Workshop – 2 days, intermediate
Frequency: At least 2 certifications + 1-2 advanced trainings per year
IT Management and architects
Typical roles: IT Manager, CTO, Solution Architect, Enterprise Architect
Priority competencies:
- Enterprise architecture frameworks (TOGAF)
- IT risk management
- Cloud strategy and vendor management
- Digital transformation
- Regulatory compliance (DORA, NIS2)
Recommended trainings:
- TOGAF 10 Foundation & Practitioner – 5 days + exam
- Cloud Strategy for financial institutions – 2 days
- IT Risk Management according to ISO 27005 – 3 days
- DORA & NIS2 for management – 1 day
Frequency: 1-2 strategic trainings per year + executive briefings on new regulations
Data scientists and analysts
Typical roles: Data Scientist, Data Engineer, Business Analyst, ML Engineer
Priority competencies:
- Machine learning and AI in banking
- Data governance according to GDPR
- Big data technologies (Spark, Kafka)
- Model explainability and ethics
- SQL and Python for analytics
Recommended trainings:
- Machine Learning for fraud detection – 5 days, advanced
- Data Engineering at scale – 4 days, intermediate
- AI Act for data teams – 1 day, basic
- Advanced SQL for analysts – 2 days, intermediate
Frequency: 2-3 trainings per year (mix tech + compliance)
Table: Training matrix for different roles
| Training | Developers | DevOps/SRE | Security | Management | Data Teams |
|---|---|---|---|---|---|
| Secure Coding | ✅ Mandatory | ➖ Optional | ✅ Mandatory | ➖ | ➖ |
| Kubernetes | ✅ Recommended | ✅ Mandatory | ➖ Optional | ➖ | ➖ |
| Penetration Testing | ➖ Optional | ➖ Optional | ✅ Mandatory | ➖ | ➖ |
| DORA Compliance | ➖ Optional | ✅ Recommended | ✅ Mandatory | ✅ Mandatory | ➖ |
| Cloud (AWS/Azure) | ✅ Recommended | ✅ Mandatory | ➖ Optional | ✅ Recommended | ➖ Optional |
| Machine Learning | ➖ | ➖ | ➖ | ➖ | ✅ Mandatory |
| DevSecOps | ✅ Recommended | ✅ Mandatory | ✅ Recommended | ➖ | ➖ |
| ISO 27001 | ➖ | ➖ Optional | ✅ Mandatory | ✅ Recommended | ➖ |
When to choose closed training and when open training for a banking team?
Banks most often face the dilemma: send employees to open training or organise dedicated closed training for the entire team? Each option has its advantages, and the choice depends on the organisation’s specifics, budget and training objectives.
Closed training (in-house)
What is it: Training designed and delivered exclusively for one organisation, at the company’s premises or a rented venue. Programme tailored to the bank’s specifics, technology stack used and regulatory challenges.
When to choose closed training:
1. Team of 6+ people needs the same knowledge
- From 6 participants, closed training becomes economical
- All key people for the project/process are trained simultaneously
- Building a common language and culture in the team
Example: A bank is migrating to AWS cloud. A team of 12 people (8 devops, 4 architects) needs training in AWS + Kubernetes + security. Closed training for 5 days costs 60-80 thousand PLN. Open training: 12 people x 8 thousand PLN = 96 thousand PLN (+ travel and accommodation costs).
2. Sensitive or bank-specific topics
- Security of banking system architecture
- Bank-specific incident response procedures
- Integration with legacy systems (core banking)
- Case studies with own data (anonymised)
Example: A bank wants to train the security team in threat modelling for the specific architecture of its payment systems. Open training will not allow discussion of real scenarios due to NDA.
3. Compliance and documentation requirement
- KNF recommendations require documentation of the training programme
- Closed training allows customisation of materials according to bank policies
- Easier reporting for auditors (one group certificate, one agenda)
4. Building team culture
- Closed training is also an opportunity for team building
- Solving problems together strengthens cooperation
- Possibility to introduce facilitation sessions into the programme (e.g. “how will we implement this knowledge in our bank?”)
Disadvantages of closed training:
- Higher cost for small groups (<6 people)
- No contact with participants from other organisations (networking)
- Requires internal organisation (venue, logistics)
Open training (public trainings)
What is it: Training on a calendar date, attended by people from different organisations. Standard programme, experienced trainer, fixed dates.
When to choose open training:
1. Individual training needs
- Only 1-2 people from the bank need the training
- Certification training (AWS, Azure, Kubernetes, ISO 27001)
- Exploration of new technologies before deciding on broader implementation
Example: A bank is considering implementing Terraform. Before making a decision, it sends one architect to open Terraform training (2 days, 6 thousand PLN). After training, the architect knows whether this tool fits the bank.
2. Networking and exchange of experience
- Opportunity to meet people from other banks/financial companies
- Exchange of best practices (within safe boundaries)
- Perspective of a trainer not associated with one organisation
Example: A security analyst from a bank goes to “Advanced Pentesting” training and meets people from other financial institutions. After training, they remain in contact and exchange threat intelligence information.
3. Budget flexibility
- Cost known in advance, individual budgets per person can be planned
- No risk of training cancellation (training company guarantees the date)
- Possibility to “purchase” places during the year as needed
4. Quick action
- No need to wait for a group to gather
- An employee can be sent within 2-4 weeks
- Good option for urgent training needs (e.g. new regulation, failure requiring new competency)
Disadvantages of open training:
- No programme customisation
- More expensive with a larger number of participants
- More difficult to adjust dates for multiple people simultaneously
Comparison table: closed vs open
| Criterion | Closed training | Open training |
|---|---|---|
| Cost for 1 person | High (15-20 thousand PLN) | Low (5-10 thousand PLN) |
| Cost for 10 people | Low (60-80 thousand PLN) | High (80-100 thousand PLN) |
| Programme customisation | ✅ Full | ❌ None |
| Date adjustment | ✅ Flexible | ❌ Fixed dates |
| Security (NDA) | ✅ Full NDA | ⚠️ Limited |
| Team building | ✅ Strong | ❌ None |
| Networking | ❌ None | ✅ High |
| Organisation time | ⚠️ 4-6 weeks | ✅ 1-2 weeks |
Recommendation for banks: hybrid model
Strategy we see at best-managed banks:
-
Closed training – for key competencies of the entire team:
- Security fundamentals (once a year, entire IT team)
- Cloud platform training (AWS/Azure, cloud teams)
- DORA/NIS2 compliance (IT + risk management)
-
Open training – for individual development needs:
- Certifications (AWS SAA, CKA, ISO 27001 Lead Auditor)
- Exploration of new technologies
- Advanced/niche topics (e.g. eBPF, WebAssembly)
-
Train-the-trainer – for scaling knowledge:
- Training 2-3 internal champions
- They then conduct internal workshops for the wider team
- E.g. Kubernetes expert from the bank, after advanced training, conducts sessions for devops
How to plan an annual training programme for the IT department in a bank?
An effective training programme is not a random list of trainings but a strategic plan linked to the bank’s business goals and regulatory requirements. Here is a framework that works in practice:
Step 1: Skills gap analysis (Q4 of previous year)
Objective: Identify competency gaps in the IT team
How to do it:
- Assessment of current competencies – survey for IT team (self-assessment + manager assessment)
- Analysis of projects for next year – what technologies will be needed?
- Compliance requirements – what do DORA, NIS2, KNF audit say?
- Market benchmark – what competencies do other banks have?
Tools:
- Competency matrix (role vs skills)
- 1:1 interviews with team leaders
- Analysis of audit and pentest results (where were weaknesses?)
Output: List of 10-15 key competencies to develop in the coming year
Example from practice: A medium-sized bank conducted skills gap analysis in Q4 2025. It identified 3 critical gaps:
- Only 2 out of 15 devops knew Kubernetes (and the bank planned to migrate 50% of workloads)
- Zero people in the security department had experience with threat-led penetration testing (DORA requirement)
- Compliance team did not understand the technical side of AI Act (and the bank was implementing ML for fraud detection)
Step 2: Prioritisation (Q4 - Q1)
Objective: Determine what is most important with a limited budget
Prioritisation framework:
| Competency | Business impact (1-5) | Required by compliance (Y/N) | Number of people to train | Training cost | Priority |
|---|---|---|---|---|---|
| Kubernetes | 5 | N | 15 | 80k PLN | HIGH |
| TLPT | 4 | Y (DORA) | 6 | 120k PLN | HIGH |
| AI Act | 3 | Y | 8 | 32k PLN | MEDIUM |
| eBPF | 2 | N | 2 | 12k PLN | LOW |
Prioritisation criteria:
- Compliance-driven – regulatory requirements (DORA, NIS2, KNF)
- Business-critical – direct impact on strategic projects
- Risk-based – areas where competency gap generates operational risk
- Quick wins – trainings that give quick ROI at low cost
Output: List of 5-8 priority training areas with justification
Step 3: Budgeting (Q1)
Typical training budgets in banks:
- Large banks (>5000 employees): 2-3% of IT salary costs = 1.5-2.5 million PLN/year
- Medium banks (500-5000): 1.5-2% = 200-800 thousand PLN/year
- Small and cooperative banks (<500): 1-1.5% = 50-150 thousand PLN/year
Budget breakdown:
- 60% – technical training (cloud, security, DevOps)
- 20% – certifications (AWS, Kubernetes, ISO)
- 10% – compliance and regulatory (DORA, NIS2)
- 10% – soft skills for IT management
Budget example for medium bank (50-person IT department):
| Category | Budget | Allocation |
|---|---|---|
| Closed training (3 trainings) | 180 thousand PLN | 60% |
| Open training (15 people x 6k) | 90 thousand PLN | 30% |
| Certifications (8 people x 3.5k) | 28 thousand PLN | 9% |
| Reserve (unforeseen) | 12 thousand PLN | 4% |
| TOTAL | 310 thousand PLN | 100% |
Tip: Reserve 10-15% of the budget for unforeseen needs (e.g. sudden regulatory change, new technology, reaction to incident).
Step 4: Schedule (Q1)
How to plan training in the year:
Q1 (January-March):
- ✅ Compliance trainings (DORA, NIS2) – meet regulatory requirements at the beginning of the year
- ✅ Foundation trainings (security awareness for all IT)
- ❌ Avoid: Off-site trainings (low travel budgets in Q1)
Q2 (April-June):
- ✅ Technical deep-dives (Kubernetes, cloud, DevSecOps)
- ✅ Certifications (AWS, Azure, CKA) – exams in Q2/Q3
- ⚠️ Note: Holiday period starts in June
Q3 (July-September):
- ⚠️ Holidays – minimal training activity in July-August
- ✅ September – good time for hands-on workshops
- ✅ Preparation for Q4 projects
Q4 (October-December):
- ✅ Advanced trainings for senior teams
- ✅ Skills gap analysis for next year
- ❌ December – avoid (holidays, year-end closing)
Best practice: Distribute key trainings evenly throughout the year. Avoid “December push” to use the budget.
Step 5: Vendor selection (Q1-Q2)
How to choose a training partner:
Selection criteria (ranked):
- Experience in the financial sector – does the trainer understand bank specifics?
- Trainers-practitioners – are they market consultants or theorists?
- Programme customisation – does the company tailor the programme or only offer a catalogue?
- Certifications and compliance – does the company have ISO 9001, AWS/Azure/Kubernetes accreditations?
- References – do they train other banks in Poland?
- Price – but not as the main criterion
Red flags:
- ❌ Trainers without practical project experience
- ❌ No NDA in the offer for banks
- ❌ “One size fits all” approach
- ❌ No backup trainer (what if the main trainer falls ill?)
Questions to ask training providers:
- Do you have experience with banks in Poland? What references?
- Who will conduct the training? What is their practical background?
- Can the programme be tailored to our stack (e.g. AWS + Terraform + Kubernetes)?
- What is your NDA policy?
- What if the trainer falls ill a day before training?
- What materials do participants receive after training?
Step 6: Communication and enrolment (all year)
How to promote training in the organisation:
-
Development paths per role – show employees a clear career path
- Junior Developer → Mid → Senior → Architect
- What trainings at each stage?
-
Joint decision manager + employee
- Not top-down (“you must go to this training”)
- Bottom-up (“what training will help you in the project?”)
-
Budget transparency
- Employees know how much money is available for training
- They can apply for training according to the process
-
Post-training knowledge sharing
- After training – 1h session for the team (“what did I learn?”)
- Materials shared in confluence/sharepoint
- Practical application in a project within 2 weeks
Step 7: Tracking and ROI (all year + Q4 review)
How to measure training effectiveness:
Level 1 – Reaction (immediately after training)
- Satisfaction surveys (1-5)
- NPS (Net Promoter Score)
- Feedback on trainer and programme
Level 2 – Learning (1 week after)
- Knowledge test (before and after training)
- Competency self-assessment (skill growth)
Level 3 – Behaviour (1-3 months after)
- Is the employee using new knowledge at work?
- Metrics: commits in new technology, resolved incidents, completed projects
Level 4 – Results (3-12 months after)
- Business impact: incident reduction, project acceleration, savings
- ROI = (training gain - training cost) / training cost
Example of measuring ROI: A bank trained a 10-person team in Kubernetes (cost 80 thousand PLN). After 6 months:
- 40% of workloads migrated to the cloud → saving 300 thousand PLN/year (fewer on-premise servers)
- Deployment time dropped from 2h to 15 min → gain 200h/year = 120 thousand PLN value of team time
- ROI = (420k - 80k) / 80k = 425%
Can IT training in the banking sector be co-financed?
Yes. There are several paths for co-financing IT training for bank employees. It is worth knowing them, as they can cover 50-80% of training costs.
1. National Training Fund (KFS)
Who can apply: Employer (bank) on behalf of employees
Funding amount: Up to 80% of training costs, max 300% of average salary per person (approx. 21 thousand PLN in 2026)
Conditions:
- Training must improve employee competencies
- Cannot finance postgraduate studies
- Preferred: training in new technologies, digitalisation, cybersecurity
Procedure:
- Bank submits application to District Labour Office (PUP)
- PUP assesses application (2-4 weeks)
- After positive decision – training implementation
- Settlement – invoices + attendance lists + certificates
Tip: KFS prefers training that responds to identified competency deficits in the region. Training in cloud, cybersecurity, AI are highly scored.
Training fundable from KFS:
- ✅ Kubernetes, AWS, Azure
- ✅ Cybersecurity, penetration testing
- ✅ DevOps, CI/CD, Infrastructure as Code
- ✅ Data engineering, machine learning
- ❌ Soft skills (communication, time management)
- ❌ Management training (unless strictly IT-related)
2. Operational Programme Knowledge Education Development (POWER)
Who can apply: Employers (including banks), especially in the context of digital transformation
Funding amount: Up to 70% of training project costs
Conditions:
- Project must cover at least 10 employees
- Training in digital competencies, Industry 4.0, AI
- Requires competitive application (complex process)
Procedure:
- Application preparation (requires consultant or funding department)
- Submission in competition (2 rounds per year)
- Assessment (2-3 months)
- Project implementation (12-24 months)
Tip: POWER requires significant administrative resources. Profitable for large training projects (20+ people, budget 200k+ PLN).
3. Funds from NFZ budget (for cooperative banks)
Who can apply: Cooperative banks associated in the protection system
Funding amount: Depends on the policy of the Associating Bank
Conditions:
- Training must be consistent with the banking group strategy
- Preferred: compliance (DORA, NIS2), cybersecurity, digital banking
Procedure:
- Contact with Associating Bank
- Application for funding according to internal procedure
4. Vendor programmes (AWS, Microsoft, Google)
What they offer:
- AWS Training Credits – credits for AWS training (for AWS customers with spending >$100k/year)
- Microsoft Azure Sponsorships – Azure certification funding
- Google Cloud Training Grants – training grants for strategic customers
Funding amount: Usually $5k-$50k depending on the size of the contract with the vendor
Conditions:
- Bank must be a customer of the cloud provider
- Requires contact with account manager
Tip: If your bank spends >$500k annually on AWS/Azure/GCP – ask the account manager about training credits. They are often available but the vendor does not offer them automatically.
Table: Comparison of funding options
| Source | Funding | Process complexity | Implementation time | Best for whom |
|---|---|---|---|---|
| KFS | Up to 80%, max 21k/person | ⭐⭐ Medium | 4-6 weeks | Small and medium banks |
| POWER | Up to 70% | ⭐⭐⭐⭐⭐ High | 3-6 months | Large projects (20+ people) |
| Associating Bank | Dependent | ⭐ Low | 2-4 weeks | Cooperative banks |
| Cloud vendors | $5k-$50k | ⭐⭐ Medium | Immediate | AWS/Azure/GCP customers |
How does EITT support banks in developing IT competencies?
EITT has been training IT teams in the financial sector for over 15 years. We have worked with commercial banks, cooperative banks, payment institutions and fintech companies throughout Poland. We understand the specifics of the regulated environment, compliance requirements and pressure on critical system security.
How do we differ from other training companies?
1. Experience in the regulated sector
- Over 500 training days for banks and financial institutions
- Trainers with project experience for ING, mBank, PKO BP
- We understand the specifics of KNF, DORA, NIS2, GDPR
2. Trainers-practitioners, not theorists
- 500+ experts in our database
- Each trainer is an active consultant/developer/security expert
- Examples from real projects (anonymised), not slides from the internet
3. Programme customisation
- We tailor each closed training to the bank’s stack
- Before training – 1h consultation call with the trainer to understand context
- Possibility to include bank case studies in the programme (with NDA)
4. Compliance and documentation
- ISO 9001:2015 certified training processes
- Documentation compliant with KNF requirements (agendas, certificates, evaluations)
- NDA standard in every bank contract
5. Backup and reliability
- Each training has a backup trainer (if the main one falls ill)
- Date guarantee (or 100% refund if we cancel from our side)
- 24/7 support before and after training
Our key trainings for the banking sector
Cybersecurity:
- Security Fundamentals for IT teams (2 days)
- Advanced Penetration Testing & TLPT (5 days)
- Zero Trust Architecture (3 days)
- SOC Analyst Training (4 days)
Cloud & Infrastructure:
- AWS for the financial sector (4 days)
- Kubernetes Administrator (4 days)
- Terraform & Infrastructure as Code (2 days)
- Cloud Security (2 days)
DevSecOps:
- DevSecOps Foundation (3 days)
- GitOps & Continuous Deployment (2 days)
- Secrets Management with Vault (1 day)
Compliance:
- DORA in practice for IT (1 day)
- NIS2 for team leaders (1 day)
- ISO 27001 Lead Implementer (5 days + exam)
- AI Act for banks (1 day)
Data & AI:
- Data Engineering for banks (4 days)
- Machine Learning for fraud detection (5 days)
- SQL and Python for analysts (3 days)
What does the collaboration process look like?
Step 1: Discovery call (30 min, free)
- We discuss your training needs
- We identify competency gaps in the team
- We propose format (closed vs open)
Step 2: Programme proposal (1 week)
- We tailor the programme to your stack
- We present trainer profile (CV, references)
- We offer several dates to choose from
Step 3: Consultation with trainer (optional, 30-60 min)
- Trainer talks with your team lead
- We specify scope (what is most important?)
- We establish hands-on exercises and case studies
Step 4: Training delivery
- Training at your premises or our centre
- 70% practice, 30% theory (hands-on oriented)
- Live Q&A, trainer support also after training
Step 5: Follow-up (1 month after)
- Email follow-up from trainer (is everything clear?)
- Possibility of 1h consultation call (included in training price)
- Access to materials and updates for a year
Example projects with banks
Case 1: Commercial bank – Kubernetes and Cloud Security
- Challenge: Bank was migrating to AWS. Team of 15 devops had no Kubernetes experience.
- Solution: 5-day closed training: Kubernetes (3 days) + Cloud Security (2 days). Tailored to the bank’s AWS architecture.
- Result: After 3 months, 50% of workloads in Kubernetes. Deployment time dropped from 2h to 20 min. Zero critical security findings in audit.
Case 2: Cooperative bank – DORA Compliance
- Challenge: DORA was coming into force, IT team did not understand technical requirements.
- Solution: 1-day training for 20 people (IT + compliance). Programme: DORA interpretation, incident response, TLPT, vendor risk.
- Result: Bank developed compliance roadmap. KNF audit without critical remarks.
Case 3: Payment institution – DevSecOps
- Challenge: Company was implementing CI/CD but without security controls. Audit revealed pipeline gaps.
- Solution: 3-day DevSecOps training for 12 devops. Hands-on: SAST/DAST in GitLab CI, secrets management with Vault.
- Result: Automated security scanning. Detected and fixed 180 vulnerabilities before production in 6 months.
Contact
Want to talk about training for your bank?
- 📧 Email: szkolenia@eitt.pl
- 📞 Phone: +48 22 123 45 67
- 🌐 Form: eitt.academy/contact
We have for you:
- Free consultation (30 min)
- Training programme proposal tailored to your needs
- Quote within 48h
FAQ - frequently asked questions about IT training in banks
How much do IT trainings for banks cost?
The cost depends on format, number of participants and level of advancement:
Open trainings:
- Basic (1-2 days): 3-6 thousand PLN/person
- Intermediate (3-4 days): 6-10 thousand PLN/person
- Advanced (5 days): 10-15 thousand PLN/person
- Certifications (+ exam): 8-20 thousand PLN/person
Closed trainings:
- Basic (1 day, up to 15 people): 12-18 thousand PLN
- Intermediate (3 days, up to 12 people): 40-60 thousand PLN
- Advanced (5 days, up to 10 people): 80-120 thousand PLN
- Programme customisation: +10-20%
What affects the price:
- Trainer experience (senior expert more expensive)
- Level of customisation (deep customisation requires more work)
- Technology (AWS/Azure trainers expensive, niche tech even more expensive)
- Location (training in a small town = trainer travel costs)
How long does a typical IT training last?
Standard durations:
- 1 day (8h) – compliance trainings (DORA, NIS2, AI Act), workshops
- 2 days (16h) – foundations (Terraform, Cloud Security, SQL)
- 3 days (24h) – intermediate depth (Kubernetes, DevSecOps, Zero Trust)
- 4-5 days (32-40h) – advanced/certification prep (Pentesting, Data Engineering, AWS SAA)
Alternative formats:
- Modules 4x4h – instead of 2 days x 8h = 4 half-days (easier organisationally for the bank)
- Weekend intensives – Saturday-Sunday for operations teams
- Evening sessions – 3h/day for 5 days (17:00-20:00)
What is optimal for a bank? For most IT teams: 2-3 days per week, hands-on format. Shorter than 2 days = too shallow. Longer than 3 days = organisationally difficult.
Can IT training be conducted online?
Yes, but with caveats. Online effectiveness depends on the type of training:
Good for online (>80% effectiveness):
- ✅ Compliance trainings (DORA, NIS2, GDPR)
- ✅ Conceptual (Architecture, Design Patterns)
- ✅ Theory-heavy (AI Act, Risk Management)
Mixed (60-80% effectiveness online):
- ⚠️ Cloud platforms (AWS, Azure) – possible with sandbox, but weaker interaction
- ⚠️ DevOps tools – requires prepared lab environment
- ⚠️ Programming – code reviews difficult remotely
Weak for online (<60% effectiveness):
- ❌ Hands-on security (Pentesting, Red Team) – requires physical lab access
- ❌ Hardware/networking – cannot configure equipment remotely
- ❌ Team-building workshops – facilitation difficult online
Best practice for banks: Hybrid model – theory online (50%), practice on-site (50%). Example: Kubernetes training = 1.5 days online (concepts, architecture) + 1.5 days on-site (hands-on deployment, troubleshooting).
What IT certificates are most valuable for bank employees?
Top 10 certificates for the banking sector (2026):
Security:
- Certified Ethical Hacker (CEH) – penetration testing basics
- OSCP (Offensive Security Certified Professional) – advanced pentesting
- ISO 27001 Lead Auditor – compliance and security audits
Cloud: 4. AWS Solutions Architect Associate (SAA) – AWS foundation 5. AWS Security Specialty – security in AWS for banks 6. Azure Security Engineer Associate – security in Azure
DevOps & Kubernetes: 7. Certified Kubernetes Administrator (CKA) – operations 8. Certified Kubernetes Security Specialist (CKS) – K8s security
Data: 9. AWS Certified Data Engineer – data pipelines in the cloud 10. Google Professional Data Engineer – big data on GCP
Why these certificates?
- Recognised in the market (facilitates recruitment)
- Verify real skills (not just theory)
- Required by auditors (especially ISO 27001, cloud security)
How much do they cost?
- Exams: $300-$500 (CEH more expensive: ~$1200)
- Preparation trainings: 5-15 thousand PLN
- Pass rate after training with EITT: 92-95%
How often should the IT team in a bank be trained?
Recommendations based on best practices:
All IT employees:
- Security awareness – minimum once a year (NIS2 requirement)
- Compliance updates (DORA, NIS2, KNF) – with regulatory changes
Developers:
- Secure coding – once a year
- New technologies – 1-2 trainings per year (cloud, frameworks, languages)
DevOps/SRE:
- Platform updates (Kubernetes, cloud) – every 12-18 months (tech changes)
- Advanced topics – 1 training per year (chaos engineering, observability)
Security teams:
- Pentesting/Red Team – every 12 months (attackers learn, you must too)
- Threat intelligence – continuous learning (webinars, conferences)
Management:
- Strategic (Cloud Strategy, Digital Transformation) – every 18-24 months
- Regulatory (new regulations) – ad hoc with changes
Bottom line: Every IT employee in a bank should have minimum 2 trainings per year (1 technical + 1 compliance).
Are IT trainings subject to KNF audit?
Yes. KNF verifies in audits whether the bank has an IT competency development programme, especially in critical areas:
What the KNF auditor checks:
- Does an IT training plan exist – documented, approved by management
- Has the IT team undergone security training – certificates, attendance lists
- Are trainings adequate to risk – bank handles payments = requires training in PSD2, fraud detection
- Is there compliance training – DORA, NIS2, GDPR
- Are there incident response procedures – and does the team know them (requires training)
Documents the auditor may request:
- Training plan for current and previous year
- Training completion certificates
- Training agendas and syllabuses
- Attendance lists
- Training evaluations (participant feedback)
Red flag for auditor: Bank implemented a new banking system in the cloud, but the DevOps team has no documented cloud security training. The auditor may consider this an operational risk.
Tip: Keep all certificates and training documentation in a central repository (SharePoint, Confluence). This will facilitate audit preparation.
What are the most common mistakes in planning IT training for banks?
7 mistakes we see regularly:
1. No link between training and business goals
- ❌ “We’ll send the team to Kubernetes because everyone is doing it”
- ✅ “We’re migrating 50% of workloads to the cloud in Q3, so the team must know Kubernetes”
2. Training only for senior staff
- ❌ Only seniors get training budget
- ✅ Juniors also need development (onboarding + foundations)
3. No follow-up after training
- ❌ Training ends, knowledge evaporates
- ✅ Post-training workshop, practical project in 2 weeks
4. Ignoring compliance training
- ❌ “Security awareness is a waste of time”
- ✅ NIS2 requires documented security training for everyone
5. Off-the-shelf training without customisation
- ❌ General Kubernetes course (doesn’t fit banking environment)
- ✅ Kubernetes + security + compliance for banks
6. No budget for certifications
- ❌ Training without exam = no competency verification
- ✅ Training + exam + retake if needed
7. Last-minute planning
- ❌ “We need DORA training in 2 weeks, DORA is coming into force”
- ✅ Planning 6-12 months in advance
Can IT training be combined with a security audit?
Yes, and this is an increasingly popular approach in banks. We call it “Training + Assessment” or “Upskill & Audit”.
How it works:
Step 1: Pre-training assessment (1 day)
- Security expert audits the bank’s infrastructure/processes
- Identifies gaps (technical debt, misconfigurations, policy gaps)
- Generates report with findings
Step 2: Training (2-3 days)
- Training tailored to identified gaps
- Hands-on exercises based on real audit findings
- Team learns how to fix problems
Step 3: Post-training workshop (0.5 day)
- Team works on action plan
- Prioritisation of fixes
- Timeline and ownership
Benefits:
- ✅ Training is ultra-relevant (based on real problems)
- ✅ Team sees direct impact (not theory, but fix our bugs)
- ✅ Bank gets 2in1: audit + training
Example: A bank commissioned “Security Assessment + DevSecOps Training”. The auditor found 40 security issues in the CI/CD pipeline. Training (3 days) focused on fixing these issues. After a month: 38/40 fixed, 2 in progress. The bank saved 6 months of trial-and-error work.
Cost: Assessment (1 day) + Training (3 days) = ~80-100 thousand PLN (vs 50-60k for training alone). The difference is the audit cost, but ROI is higher.
Summary: the key to effective IT training in the banking sector
IT training in banks is a strategic investment, not a cost. In an environment of growing regulatory requirements (DORA, NIS2), cyber threats and pressure on digital transformation, IT team competencies are the foundation of bank security and competitiveness.
Key principles of an effective training programme:
- Start with skills gap analysis – don’t guess, measure real competency gaps
- Prioritise compliance – DORA, NIS2, KNF are not optional, they are mandatory
- Tailor training to roles – a developer needs different competencies than a security analyst
- Choose trainers-practitioners – theory is not enough, project experience is needed
- Customise programmes – off-the-shelf training rarely fits banks
- Measure ROI – track not only satisfaction but business impact of training
- Plan long-term – training programme is a roadmap for 12-24 months, not ad hoc
Remember: In 2026, the average cost of a data breach in the financial sector is 24 million PLN (IBM). An investment of 300 thousand PLN per year in IT training is 1.25% of that risk. It’s not a cost – it’s insurance.
If you want to talk about a training programme for your bank, contact us. The first consultation is free, and we have over 15 years of experience in training for the financial sector.
EITT – 500+ experts. 2500+ trainings. Rating 4.8/5. ISO 9001:2015.
📧 szkolenia@eitt.pl | 📞 +48 22 123 45 67 | 🌐 eitt.pl/banking-sector
Read Also
- DORA for the Financial Sector - Mandatory Competencies 2026
- Mandatory IT Training in Regulated Industries - 2026 Checklist
- IT Competencies in Manufacturing and Industry 4.0 - Training Plan
Read also
- DORA for the Financial Sector - Mandatory Competencies 2026
- NIS2 Training - What Your IT Team Needs to Know
- Cyber security in the company: the NIS2 directive, DORA and building resilience
Develop your skills
Want to deepen your knowledge in this area? Check out our training led by experienced EITT instructors.