An interdisciplinary approach between firms and their service providers is crucial to successfully "tame" DORA says PJ Di Giammarino of JWG.
GRIP2 min read
Julie DiMauro35 min listen
GRIP2 min read
EU DORA RTS - ICT risk management framework
An interdisciplinary approach between firms and their service providers is crucial to successfully "tame" DORA says PJ Di Giammarino of JWG.
PJ Di Giammarino | JWG5 min read
Managing ICT third-party risk under DORA
Requirements imposed on financial services institutions when procuring ICT services from third parties - regulation and best practice.
Nikhil Shah | Fieldfisher14 min read
Your DORA questions answered – Business resilience more broadly
This fifth of a series of articles covering a practical session organised by Ashurst focuses on business resilience questions connected to DORA.
Thomas Hyrkiel3 min read
Technology
Taming the DORA dragon
Regulation
Managing ICT third-party risk under DORA
Technology
Your DORA questions answered – Business resilience more broadly
While not legally binding, the guide provides clarity on ESMA's assessment process for financial entities navigating the registration process.
Jean Hurley1 min read
Comprehensive register of key documents is relevant to all organizations running digital systems and needing to ensure their security.
Thomas Hyrkiel2 min read
The regulator continues to be concerned about outsourcing dependency and concentration risk and wants to obtain clarity on technology interconnectedness in the financial sector.
Thomas Hyrkiel2 min read
Full implementation is vital for strengthening the EU's financial sector against increasing digital risks.
Jean Hurley1 min read
Other news includes assistance from the SEC for filers using EDGAR, a probe into Nvidia shipments to Malaysia and another bank reviewing its approach to DEI.
GRIP1 min read
Adequate preparation, identifying what and who is critical, and, above all, "practice, practice, practice" highlighted.
Martina Lindberg, Jean Hurley3 min read
DORA is a response to persistently elevated cyber threat levels, Jean and Thomas discuss how firms can achieve operational resilience.
Jean Hurley, Thomas Hyrkiel23 min listen
ICT providers designated critical under DORA will get six weeks to challenge the designation.
Jean Hurley1 min read