The Digital Operational Resilience Act (DORA): A Comprehensive Guide to TPRM Compliance

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Amidst an ever-evolving threat landscape, the European Union (EU) has taken a decisive step to safeguard the resilience of the financial system by enacting the Digital Operational Resilience Act (DORA).

This crucial legislation, which will come into force on 17th January 2024, is focusing particularly on reducing the risks emanating from critical ICT third-party service providers to the sector. As such, DORA has significant third-party risk management implications for organisations in scope.

Risk Ledger has teamed up with Evelyn Partners to produce a comprehensive white paper on DORA’s third-party risk management implications.

In this white paper, you will learn:

  • The basics of DORA, its five key pillars and which organisations outside the EU fall under its remit
  • DORA’s key requirements as they relate to ICT risk management, ICT incident response reporting, Digital Operational Resilience Testing, ICT Third-Party Risk Management and Information Sharing
  • What DORA says about contractual agreements with critical third-parties and the need for exit clauses
  • How DORA expects financial entities to reduce concentration risks to the sector, and ensure the security of subcontractors and other 4th parties that are critical to their operations.
  • Why continuous monitoring of all critical third-parties during the entire contract lifecycle is expected

Brought to you by

Should you download this content your information may be shared with the sponsors indicated above. Please see the privacy policy for Risk Ledger here: https://riskledger.com/privacy. Please see Infosecurity Magazine’s privacy policy for more information.