Managing vendors supporting critical or important functions - from zero to full compliance with DORA
A summary of key practical steps based on the draft technical standard.
EU DORA RTS - third party contractual arrangements - Art 1
Complexity and risk considerations include:
Article 1 distinguishes between third-service providers located within an EU member state and those located in a third country (Art 1(c)). As well as those providers who are authorised and supervised by a competent authority in an EU member state and those that are not (Art 1(f)).
A practical way of approaching this foundational article is to:
Differentiate between third parties that are:
And two key questions to ask in connection with the location:
Managing vendors supporting critical or important functions - from zero to full compliance with DORA
A summary of key practical steps based on the draft technical standard.
Thomas Hyrkiel, Katarzyna Parchimowicz5 min read
Your DORA questions answered – Extraterritoriality and interaction with existing rules
This last of a series of six articles covering a practical session organised by Ashurst focuses on how DORA will interact with existing rules as well as its extraterritorial effects.
Thomas Hyrkiel3 min read
Your DORA questions answered – ICT services in scope
This second of a series of six articles covering a practical session organised by Ashurst focuses on the ICT services in scope of DORA.
Thomas Hyrkiel3 min read
Technology
Managing vendors supporting critical or important functions - from zero to full compliance with DORA
Technology
Your DORA questions answered – Extraterritoriality and interaction with existing rules
Technology
Your DORA questions answered – ICT services in scope
Practical advice and steps for organizations to understand and comply with sovereignty and localization rules.
Dora Petranyi | CMS, Emma Burnett | CMS, Tom De Cordier | CMS11 min read
The central bank intends to hold 17 events tied to compliance-central topics such as DORA, AML, and third-party risk management.
Vasilka Lalevska1 min read
Cybersecurity, responsible business practices, and combating money laundering are among the 2026-2028 focus areas.
Vasilka Lalevska3 min read
An Ashurst panel, together with guest speaker Will Barlow of Crowdstrike, discussed what steps you should be taking to prepare for a cybersecurity incident.
Jean Hurley, Martina Lindberg3 min read
Many global organizations have learned that without appropriate oversight, third parties can become liabilities. Max Veve says DORA is the stand out regulation.
Max Veve3 min read
The stark reality of modern cyber defence is that technology, however sophisticated, is easily bypassed by human error.
Maria Symeon | Pathlight Associates3 min read
Risk-based framework to help FIs identify which of their systems must be upgraded first to defend against the future threat of quantum computers.
Jean Hurley2 min read
European supervisors carried out a systematic assessment of the importance of each service provider to the financial sector, before deciding on designation.
Hameed Shuja3 min read
Further Reading