Your DORA questions answered – ICT third party contracts
This fourth of a series of six articles covering a practical session organised by Ashurst focuses on information and communication technology third party contracts.
GRIP2 min read
Julie DiMauro35 min listen
GRIP2 min read
The policy must cover at least the following:
Your DORA questions answered – ICT third party contracts
This fourth of a series of six articles covering a practical session organised by Ashurst focuses on information and communication technology third party contracts.
Thomas Hyrkiel5 min read
Your DORA questions answered – ICT services in scope
This second of a series of six articles covering a practical session organised by Ashurst focuses on the ICT services in scope of DORA.
Thomas Hyrkiel3 min read
Your DORA questions answered – CIFs
This third of a series of six articles covering a practical session organised by Ashurst focuses on critical or important functions.
Thomas Hyrkiel4 min read
Technology
Your DORA questions answered – ICT third party contracts
Technology
Your DORA questions answered – ICT services in scope
Technology
Your DORA questions answered – CIFs
Comprehensive register of key documents is relevant to all organizations running digital systems and needing to ensure their security.
Thomas Hyrkiel2 min read
The regulator continues to be concerned about outsourcing dependency and concentration risk and wants to obtain clarity on technology interconnectedness in the financial sector.
Thomas Hyrkiel2 min read
Full implementation is vital for strengthening the EU's financial sector against increasing digital risks.
Jean Hurley1 min read
Other news includes assistance from the SEC for filers using EDGAR, a probe into Nvidia shipments to Malaysia and another bank reviewing its approach to DEI.
GRIP1 min read
Adequate preparation, identifying what and who is critical, and, above all, "practice, practice, practice" highlighted.
Martina Lindberg, Jean Hurley3 min read
DORA is a response to persistently elevated cyber threat levels, Jean and Thomas discuss how firms can achieve operational resilience.
Jean Hurley, Thomas Hyrkiel23 min listen
ICT providers designated critical under DORA will get six weeks to challenge the designation.
Jean Hurley1 min read
DORA ICT risk management requirements apply to financial entities in their place.
Thomas Hyrkiel1 min read
Further Reading