DORA Requirements and AI Security: From Compliance to Threat Intelligence
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 43m | 80.6 MB
Instructor: Malcolm Shore
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 43m | 80.6 MB
Instructor: Malcolm Shore
This course provides an overview of the Digital Operational Resilience Act (DORA) and the technical guidelines for implementing the security required to comply with it. Instructor Malcolm Shore reviews the five main pillars of DORA, with special focus on risk management and understanding and managing the risk from third party service providers. It details requirements for oversight of service providers. Malcom also covers information and intelligence sharing in support of threat led penetration testing, notification of incidents, and chaos engineering as a means of improving resilience.
Learning objectives
- Analyze the five pillars of DORA and their implications for organizational security and compliance requirements
- Evaluate third-party service provider risks and develop appropriate oversight mechanisms that satisfy DORA requirements.
- Design incident response procedures that comply with DORA's notification and information sharing mandates.
- Implement AI security controls and training guardrails to protect against prompt engineering attacks and other AI-specific threats.
- Synthesize threat intelligence data to create effective risk management and testing strategies that address both DORA compliance and AI security concerns.
- Apply chaos engineering to test resilience.