Managing vendors supporting critical or important functions - from zero to full compliance with DORA
A summary of key practical steps based on the draft technical standard.
Julie DiMauro4 min read
Hameed Shuja2 min read
Ben Maconick | CMS, Ash Saluja | CMS, Pippa Tasker | CMS4 min read
EU DORA RTS - third party contractual arrangements - Art 1
Complexity and risk considerations include:
Article 1 distinguishes between third-service providers located within an EU member state and those located in a third country (Art 1(c)). As well as those providers who are authorised and supervised by a competent authority in an EU member state and those that are not (Art 1(f)).
A practical way of approaching this foundational article is to:
Differentiate between third parties that are:
And two key questions to ask in connection with the location:
Managing vendors supporting critical or important functions - from zero to full compliance with DORA
A summary of key practical steps based on the draft technical standard.
Thomas Hyrkiel, Katarzyna Parchimowicz5 min read
Your DORA questions answered – Extraterritoriality and interaction with existing rules
This last of a series of six articles covering a practical session organised by Ashurst focuses on how DORA will interact with existing rules as well as its extraterritorial effects.
Thomas Hyrkiel3 min read
Your DORA questions answered – ICT services in scope
This second of a series of six articles covering a practical session organised by Ashurst focuses on the ICT services in scope of DORA.
Thomas Hyrkiel3 min read
Technology
Managing vendors supporting critical or important functions - from zero to full compliance with DORA
Technology
Your DORA questions answered – Extraterritoriality and interaction with existing rules
Technology
Your DORA questions answered – ICT services in scope
Full implementation is vital for strengthening the EU's financial sector against increasing digital risks.
Jean Hurley1 min read
Other news includes assistance from the SEC for filers using EDGAR, a probe into Nvidia shipments to Malaysia and another bank reviewing its approach to DEI.
GRIP1 min read
Adequate preparation, identifying what and who is critical, and, above all, "practice, practice, practice" highlighted.
Martina Lindberg, Jean Hurley3 min read
DORA is a response to persistently elevated cyber threat levels, Jean and Thomas discuss how firms can achieve operational resilience.
Jean Hurley, Thomas Hyrkiel23 min listen
ICT providers designated critical under DORA will get six weeks to challenge the designation.
Jean Hurley1 min read
DORA ICT risk management requirements apply to financial entities in their place.
Thomas Hyrkiel1 min read
In this second part of our discussion with Lafond, he refers to internal threats, side-channel attacks, vendor risks and having a well-equipped incident response plan and team.
Julie DiMauro10 min read
With DORA now in effect, the EU’s financial sector is entering a new phase of operational resilience obligations, where firms must shift from preparation to action.
Nathaniel Lalone | Katten, Ciara McBrien | Katten5 min read
Further Reading