![]() |
Learn About Dora (Digital Operational Resilience Act)
![]() Learn About Dora (Digital Operational Resilience Act) Published 12/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 585.83 MB | Duration: 2h 3m 5 pillars of DORA: ICT Risk Management, Incident Reporting, Resilience Testing, Third-party Risk & Information What you'll learn DORA (Digital Operational Resilience Act) DORA's framework: 5 Key Pillars Pillar 1: ICT Risk Management Pillar 2 - ICT -Incident reporting Pillar 3 - Digital operational resilience testing Pillar 4 - Third-party risk management Pillar 5 - Information Sharing Preparing for DORA: a strategic approach 6 Steps for a strategic approach for DORA Compliance Requirements Basic knowledge of Cybersecurity Fire to learn :) Description This course is designed for those looking to master DORA regulations, ensuring compliance while strengthening their cybersecurity measures, improving operational continuity, and ICT resilience.Unlock the power of DORA (Digital Operational Resilience Act) with our comprehensive online course designed for professionals in the EU financial sector. Learn how to comply with DORA regulations and enhance your organization's ICT risk management, cybersecurity, and operational resilience. This course covers the five pillars of DORA, including ICT risk management, incident reporting, resilience testing, third-party risk, and information sharing.Whether you're a bank, investment firm, insurance company, or pension fund, this course will provide you with the skills and knowledge to ensure your organization meets DORA's strict requirements. Stay ahead in the financial industryby mastering key topics like cybersecurity risk management, digital infrastructure resilience, and third-party risk mitigation.Key Learning Outcomes:Understand the core principles of DORA complianceBuild and manage robust ICT risk management strategiesImplement cyber resilience testing and improve incident responseSafeguard your organization from third-party risksMaster DORA reporting and regulatory requirementsIdeal for:Risk managers, compliance officers, and IT security professionals in the financial services industryFinancial institutions looking to comply with EU regulations and improve their digital resilienceAnyone interested in cybersecurity and operational continuity in the financial sectorEnroll today and become an expert in DORA compliance, digital resilience, and ensuring your organization's cybersecurity meets the highest EU standards! Overview Section 1: Introduction Lecture 1 What is DORA Lecture 2 What is European Union ? Lecture 3 Key Features of DORA Lecture 4 Need For DORA Section 2: DORA's framework: 5 Key Pillars Lecture 5 DORA's framework Overview Section 3: Pillar 1: ICT Risk Management Lecture 6 ICT risk management Lecture 7 Risk assessment and mitigation Lecture 8 Implementing protective measures Lecture 9 Practical Approaches to ICT Risk Management Implementation Section 4: Pillar 2 - ICT -Incident reporting Lecture 10 Real Time Detection Lecture 11 Incident Analysis Lecture 12 Implement ICT -Effective Incident Reporting Section 5: Pillar 3 - Digital operational resilience testing Lecture 13 Overview - Digital operational resilience testing Lecture 14 Regular Testing Lecture 15 Independent Evaluation Lecture 16 Implementation of Key Strategies for Digital Resilience Testing Section 6: Pillar 4 - Third-party risk management Lecture 17 Third-party risk management - Objective Lecture 18 Managing Third-Party Contracts Under DORA Lecture 19 Continuous Monitoring Of Third Party Providers Lecture 20 Implement Effective third-party risk management under DORA Section 7: Pillar 5 - Information Sharing Lecture 21 Information Sharing Under DORA Lecture 22 Confidentiality and Compliance in Information Sharing Section 8: Preparing for DORA: a strategic approach Lecture 23 6 Steps for a strategic approach for DORA Compliance Lecture 24 Step 1: Conducting gap assessments Lecture 25 Step 2: Developing a compliance roadmap Lecture 26 Step 3: Revising third-party contracts Lecture 27 Step 4: Improving incident reporting mechanisms Lecture 28 Step 5: Implementing resilience testing programs Lecture 29 Step 6: Establishing governance structures Section 9: Conclusion Lecture 30 Conclusion Compliance Experts,CISO,Cybersecurity experts,Risk management professionals,CISO,CIO,CFO Screenshot |
Часовой пояс GMT +3, время: 11:44. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot