Please enjoy this free trial of our subscription content service, for a limited time only.
The mass data breach of the infamous Ashley Madison website offers insight into data privacy and cybersecurity.
A faulty code resulted in one of the most widespread tech outages in recent years for companies using Windows.
The RTSs focus on ICT-incident reporting, ICT risk management and contractual relationships with third-parties supporting critical or important functions
How mandatory contract provisions under DORA map to existing regulatory regimes in respect of outsourcing arrangements and highlighting some of the gaps.
Ashurst Partner Bradley Rice addressed some of the key practical challenges of DORA at Global Relay’s gathering of compliance professionals.
Latest State of Application Security report from web security firm Cloudflare reveals the size of the challenge.
An interdisciplinary approach between firms and their service providers is crucial to successfully “tame” DORA says PJ Di Giammarino of JWG.
Covering application of the Guide; overview of the ECB’s supervisory expectations, including governance of cloud services and BCPs; and the DORA timetable.