Learn About Dora (Digital Operational Resilience Act)
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 585.83 MB | Duration: 2h 3m
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 585.83 MB | Duration: 2h 3m
5 pillars of DORA: ICT Risk Management, Incident Reporting, Resilience Testing, Third-party Risk & Information
What you'll learn
DORA (Digital Operational Resilience Act)
DORA’s framework: 5 Key Pillars
Pillar 1: ICT Risk Management
Pillar 2 - ICT -Incident reporting
Pillar 3 - Digital operational resilience testing
Pillar 4 - Third-party risk management
Pillar 5 - Information Sharing
Preparing for DORA: a strategic approach
6 Steps for a strategic approach for DORA Compliance
Requirements
Basic knowledge of Cybersecurity
Fire to learn :)
Description
This course is designed for those looking to master DORA regulations, ensuring compliance while strengthening their cybersecurity measures, improving operational continuity, and ICT resilience.Unlock the power of DORA (Digital Operational Resilience Act) with our comprehensive online course designed for professionals in the EU financial sector. Learn how to comply with DORA regulations and enhance your organization’s ICT risk management, cybersecurity, and operational resilience. This course covers the five pillars of DORA, including ICT risk management, incident reporting, resilience testing, third-party risk, and information sharing.Whether you're a bank, investment firm, insurance company, or pension fund, this course will provide you with the skills and knowledge to ensure your organization meets DORA's strict requirements. Stay ahead in the financial industryby mastering key topics like cybersecurity risk management, digital infrastructure resilience, and third-party risk mitigation.Key Learning Outcomes:Understand the core principles of DORA complianceBuild and manage robust ICT risk management strategiesImplement cyber resilience testing and improve incident responseSafeguard your organization from third-party risksMaster DORA reporting and regulatory requirementsIdeal for:Risk managers, compliance officers, and IT security professionals in the financial services industryFinancial institutions looking to comply with EU regulations and improve their digital resilienceAnyone interested in cybersecurity and operational continuity in the financial sectorEnroll today and become an expert in DORA compliance, digital resilience, and ensuring your organization's cybersecurity meets the highest EU standards!
Overview
Section 1: Introduction
Lecture 1 What is DORA
Lecture 2 What is European Union ?
Lecture 3 Key Features of DORA
Lecture 4 Need For DORA
Section 2: DORA’s framework: 5 Key Pillars
Lecture 5 DORA’s framework Overview
Section 3: Pillar 1: ICT Risk Management
Lecture 6 ICT risk management
Lecture 7 Risk assessment and mitigation
Lecture 8 Implementing protective measures
Lecture 9 Practical Approaches to ICT Risk Management Implementation
Section 4: Pillar 2 - ICT -Incident reporting
Lecture 10 Real Time Detection
Lecture 11 Incident Analysis
Lecture 12 Implement ICT -Effective Incident Reporting
Section 5: Pillar 3 - Digital operational resilience testing
Lecture 13 Overview - Digital operational resilience testing
Lecture 14 Regular Testing
Lecture 15 Independent Evaluation
Lecture 16 Implementation of Key Strategies for Digital Resilience Testing
Section 6: Pillar 4 - Third-party risk management
Lecture 17 Third-party risk management - Objective
Lecture 18 Managing Third-Party Contracts Under DORA
Lecture 19 Continuous Monitoring Of Third Party Providers
Lecture 20 Implement Effective third-party risk management under DORA
Section 7: Pillar 5 - Information Sharing
Lecture 21 Information Sharing Under DORA
Lecture 22 Confidentiality and Compliance in Information Sharing
Section 8: Preparing for DORA: a strategic approach
Lecture 23 6 Steps for a strategic approach for DORA Compliance
Lecture 24 Step 1: Conducting gap assessments
Lecture 25 Step 2: Developing a compliance roadmap
Lecture 26 Step 3: Revising third-party contracts
Lecture 27 Step 4: Improving incident reporting mechanisms
Lecture 28 Step 5: Implementing resilience testing programs
Lecture 29 Step 6: Establishing governance structures
Section 9: Conclusion
Lecture 30 Conclusion
Compliance Experts,CISO,Cybersecurity experts,Risk management professionals,CISO,CIO,CFO