Tags
Language
Tags
November 2024
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Digital Operational Resilience Act (Dora)

Posted By: ELK1nG
Digital Operational Resilience Act (Dora)

Digital Operational Resilience Act (Dora)
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 961.19 MB | Duration: 4h 13m

Become DORA Compliance Specialist

What you'll learn

Digital Operational Resilience Act (DORA)

Key Provisions of DORA

ICT Risk Management Framework

Incident Reporting Framework

Digital Operational Resilience Testing

Oversight of Third-Party ICT Providers

DORA Implementation Roadmap

Challenges and Solutions in Implementing DORA

Regulatory Cooperation and Updates

Requirements

Eager to Learn.

Description

The Digital Operational Resilience Act (DORA) is a comprehensive program designed to equip professionals with the knowledge and practical skills required to comply with the European Union’s DORA framework. This certification focuses on enhancing digital operational resilience by addressing critical areas such as ICT risk management, incident reporting, resilience testing, third-party oversight, and regulatory alignment. Tailored for compliance officers, risk managers, ICT professionals, and financial sector leaders, the course provides actionable insights and real-world applications to ensure regulatory compliance and operational readiness.The course begins with What is DORA?, covering its purpose, scope, and the vital role of technology in operational resilience. Participants will explore Objectives and Importance of DORA in Financial Systems, including governance frameworks, risk management protocols, and incident reporting obligations. The program delves into developing and implementing ICT Risk Management Frameworks, providing practical strategies for Identifying, Assessing, and Monitoring Risks while designing effective Incident Response and Recovery Plans. Detailed sessions on Incident Reporting Frameworks guide learners through Definitions and Classifications of Incidents, Notification Timelines and Reporting Processes, and Coordination with Supervisory Authorities, complemented by practical scenarios to reinforce understanding.A significant portion of the course focuses on Digital Operational Resilience Testing, including Types of Testing (e.g., Vulnerability Assessment, Penetration Testing), Threat-Led Penetration Testing (TLPT) Requirements, and Interpreting Results and Taking Corrective Actions to drive improvements. Oversight of Third-Party ICT Providers is another crucial area, with discussions on Critical Third-Party Relationships Under DORA, Risk Assessments for ICT Providers, and Contracts and Compliance Monitoring. The DORA Implementation Roadmap module offers step-by-step guidance on Setting Up Governance Structures, Resource Allocation for Compliance, and Key Performance Indicators (KPIs) for Measuring Compliance.The course also addresses Challenges and Solutions in Implementing DORA, presenting Common Challenges in Meeting DORA Requirements and industry case studies to illustrate Practical Solutions for Overcoming Challenges. Participants will gain insights into Regulatory Cooperation and Updates, ensuring learners are fully prepared to apply their knowledge in real-world settings. This certification is a vital step for professionals seeking to excel in regulatory compliance and operational resilience within the financial and ICT sectors.

Overview

Section 1: Introduction to DORA

Lecture 1 What is DORA?

Lecture 2 Objectives and Importance of DORA in Financial Systems.

Lecture 3 Scope of DORA: Entities and Activities Covered.

Lecture 4 The Role of Technology in Operational Resilience.

Section 2: Key Provisions of DORA

Lecture 5 Governance and Oversight Frameworks.

Lecture 6 ICT Risk Management Requirements.

Lecture 7 Incident Reporting Obligations.

Lecture 8 Digital Operational Resilience Testing.

Section 3: ICT Risk Management Framework

Lecture 9 Establishing ICT Risk Management Policies.

Lecture 10 Identifying, Assessing, and Monitoring Risks.

Lecture 11 Incident Response and Recovery Plans.

Lecture 12 Examples of ICT Risk Mitigation Strategies.

Section 4: Incident Reporting Framework

Lecture 13 Definitions and Classifications of Incidents.

Lecture 14 Notification Timelines and Reporting Processes.

Lecture 15 Coordination with Supervisory Authorities.

Lecture 16 Practical Scenarios for Incident Reporting.

Section 5: Digital Operational Resilience Testing

Lecture 17 Types of Testing (e.g., Vulnerability Assessment, Penetration Testing).

Lecture 18 Threat-Led Penetration Testing (TLPT) Requirements.

Lecture 19 Guidelines for Testing Frequency and Scope.

Lecture 20 Interpreting Results and Taking Corrective Actions.

Section 6: Oversight of Third-Party ICT Providers

Lecture 21 Critical Third-Party Relationships Under DORA.

Lecture 22 Risk Assessments for ICT Providers.

Lecture 23 Contracts and Compliance Monitoring.

Lecture 24 Examples of Risks from Third-Party Providers and Mitigation Techniques.

Section 7: DORA Implementation Roadmap

Lecture 25 Steps for Aligning Internal Processes with DORA.

Lecture 26 Setting Up Governance Structures.

Lecture 27 Resource Allocation for Compliance.

Lecture 28 Key Performance Indicators (KPIs) for Measuring Compliance.

Section 8: Challenges and Solutions in Implementing DORA

Lecture 29 Common Challenges in Meeting DORA Requirements.

Lecture 30 Industry Case Studies of Successful Implementation.

Section 9: Regulatory Cooperation and Updates

Lecture 31 Regulatory Cooperation and Updates

Section 10: Real-Life Examples of DORA Compliance.

Lecture 32 Real-Life Examples of DORA Compliance.

Compliance Professionals, ICT and Cybersecurity Professionals,Risk Management Professionals, Financial Services Executives,Third-Party ICT Providers, Legal and Regulatory Advisors,Professionals Preparing for DORA Certification, Consultants,Students and Aspiring Professionals