Submit Search
Upload
DORA Act Overview
•
1 like
•
605 views
AI-enhanced title
FinTech Belgium
Follow
Digital Finance Summit 2022 https://www.digitalfinancesummit.com/
Read less
Read more
Economy & Finance
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
ICT Risk Management and ICT third party risk Objectives
ICT Risk Management and ICT third party risk Objectives
ssuser382ff5
SOC 2 Compliance and Certification
SOC 2 Compliance and Certification
ControlCase
DXC Presentation.pptx
DXC Presentation.pptx
TechMeetups
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Cristian Garcia G.
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
John Yeoh
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
Priyanka Aash
Cloud Trends - Cloud 2.0 - Living on the Edge.pdf
Cloud Trends - Cloud 2.0 - Living on the Edge.pdf
Peter Witsenburg
Recommended
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
ICT Risk Management and ICT third party risk Objectives
ICT Risk Management and ICT third party risk Objectives
ssuser382ff5
SOC 2 Compliance and Certification
SOC 2 Compliance and Certification
ControlCase
DXC Presentation.pptx
DXC Presentation.pptx
TechMeetups
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Cristian Garcia G.
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
John Yeoh
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
Priyanka Aash
Cloud Trends - Cloud 2.0 - Living on the Edge.pdf
Cloud Trends - Cloud 2.0 - Living on the Edge.pdf
Peter Witsenburg
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
A case for Managed Detection and Response
A case for Managed Detection and Response
Digital Transformation EXPO Event Series
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
Dinis Cruz
Netskope Overview
Netskope Overview
Netskope
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
Deloitte gov federal practice
Deloitte gov federal practice
DeloitteGov
Digital Transformation With MuleSoft : That Wins Customers
Digital Transformation With MuleSoft : That Wins Customers
pqrs1234
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
Cloud Migration Workshop
Cloud Migration Workshop
Amazon Web Services
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
Netskope
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Session Sponsored by Splunk: Splunk for the Cloud, in the Cloud
Session Sponsored by Splunk: Splunk for the Cloud, in the Cloud
Amazon Web Services
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
Dr Madhu Aman Sharma
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
Denitsa Dimova
Accenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A Service
accenture
Introduction to Tenable
Introduction to Tenable
Bharat Jindal
Risk Management Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
SABSAcourses
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
SLA-Ready Network
BDVe Webinar Series - Making GDPR for SMEs
BDVe Webinar Series - Making GDPR for SMEs
Big Data Value Association
More Related Content
What's hot
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
A case for Managed Detection and Response
A case for Managed Detection and Response
Digital Transformation EXPO Event Series
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
Dinis Cruz
Netskope Overview
Netskope Overview
Netskope
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
Deloitte gov federal practice
Deloitte gov federal practice
DeloitteGov
Digital Transformation With MuleSoft : That Wins Customers
Digital Transformation With MuleSoft : That Wins Customers
pqrs1234
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
Cloud Migration Workshop
Cloud Migration Workshop
Amazon Web Services
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
Netskope
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Session Sponsored by Splunk: Splunk for the Cloud, in the Cloud
Session Sponsored by Splunk: Splunk for the Cloud, in the Cloud
Amazon Web Services
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
Dr Madhu Aman Sharma
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
Denitsa Dimova
Accenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A Service
accenture
Introduction to Tenable
Introduction to Tenable
Bharat Jindal
Risk Management Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
SABSAcourses
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
What's hot
(20)
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
A case for Managed Detection and Response
A case for Managed Detection and Response
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
Netskope Overview
Netskope Overview
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Deloitte gov federal practice
Deloitte gov federal practice
Digital Transformation With MuleSoft : That Wins Customers
Digital Transformation With MuleSoft : That Wins Customers
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Cloud Migration Workshop
Cloud Migration Workshop
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Session Sponsored by Splunk: Splunk for the Cloud, in the Cloud
Session Sponsored by Splunk: Splunk for the Cloud, in the Cloud
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
Accenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A Service
Introduction to Tenable
Introduction to Tenable
Risk Management Approach to Cyber Security
Risk Management Approach to Cyber Security
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Similar to DORA Act Overview
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
SLA-Ready Network
BDVe Webinar Series - Making GDPR for SMEs
BDVe Webinar Series - Making GDPR for SMEs
Big Data Value Association
SOC 2 presentation. Overview of SOC 2 assessment
SOC 2 presentation. Overview of SOC 2 assessment
Modu9
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Charmaine Servado
Janrain Identity Cloud GDPR Assessment Kit
Janrain Identity Cloud GDPR Assessment Kit
Sean Bailey
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Knowledge Group
WBC Summit Initio GDPR and blockchain
WBC Summit Initio GDPR and blockchain
Initio
Reasons to consider Binding Corporate Rules
Reasons to consider Binding Corporate Rules
Jan Dhont
CIF Self Certification MSP Oct15
CIF Self Certification MSP Oct15
Jason Wyatt
Cyber Security Risk Management
Cyber Security Risk Management
Shaun Sloan
Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011
harding77
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
confluent
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
Insurance Round Table
Insurance Round Table
R3
Microsoft General - Checklist for Financial Institutions in Angola.pdf
Microsoft General - Checklist for Financial Institutions in Angola.pdf
adanilsoafricanocarv
GDPR & corporate governance: The Role of Internal Audit and Risk Management O...
GDPR & corporate governance: The Role of Internal Audit and Risk Management O...
FERMA
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
Doug Newdick
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
vrickens
dl-presentation-deutsche-telekom.pdf
dl-presentation-deutsche-telekom.pdf
ShadiTraboulsi1
Similar to DORA Act Overview
(20)
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
BDVe Webinar Series - Making GDPR for SMEs
BDVe Webinar Series - Making GDPR for SMEs
SOC 2 presentation. Overview of SOC 2 assessment
SOC 2 presentation. Overview of SOC 2 assessment
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Janrain Identity Cloud GDPR Assessment Kit
Janrain Identity Cloud GDPR Assessment Kit
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
WBC Summit Initio GDPR and blockchain
WBC Summit Initio GDPR and blockchain
Reasons to consider Binding Corporate Rules
Reasons to consider Binding Corporate Rules
CIF Self Certification MSP Oct15
CIF Self Certification MSP Oct15
Cyber Security Risk Management
Cyber Security Risk Management
Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Insurance Round Table
Insurance Round Table
Microsoft General - Checklist for Financial Institutions in Angola.pdf
Microsoft General - Checklist for Financial Institutions in Angola.pdf
GDPR & corporate governance: The Role of Internal Audit and Risk Management O...
GDPR & corporate governance: The Role of Internal Audit and Risk Management O...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
dl-presentation-deutsche-telekom.pdf
dl-presentation-deutsche-telekom.pdf
More from FinTech Belgium
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
FinTech Belgium
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
FinTech Belgium
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
FinTech Belgium
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
FinTech Belgium
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
FinTech Belgium
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
FinTech Belgium
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal. .pptx
FinTech Belgium
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson. .pptx
FinTech Belgium
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden. .pdf
FinTech Belgium
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
FinTech Belgium
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
FinTech Belgium
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
FinTech Belgium
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
FinTech Belgium
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
FinTech Belgium
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen. .pptx
FinTech Belgium
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_. .pptx
FinTech Belgium
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock pptx
FinTech Belgium
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024. .pptx
FinTech Belgium
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
FinTech Belgium
S5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptx
FinTech Belgium
More from FinTech Belgium
(20)
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal. .pptx
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson. .pptx
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden. .pdf
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen. .pptx
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_. .pptx
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock pptx
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024. .pptx
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptx
Recently uploaded
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
AdamYassin2
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
fqiuho152
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
Henry Tapper
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
Michael Silva
SBP-Market-Operations and market managment
SBP-Market-Operations and market managment
factical
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
Henry Tapper
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Shaheen Kumar
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
Adnet Communications
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
Aggregage
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
Suhani Kapoor
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
Commercial Bank of Ceylon PLC
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
Suhani Kapoor
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
Suhani Kapoor
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
divyansh0kumar0
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
Bladex
Attachment Of Assets......................
Attachment Of Assets......................
AmanBajaj36
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
Henry Tapper
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
shaunmashale756
Recently uploaded
(20)
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
SBP-Market-Operations and market managment
SBP-Market-Operations and market managment
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
Attachment Of Assets......................
Attachment Of Assets......................
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
DORA Act Overview
1.
Digital Operational Resilience Act Thomas Meyer –
Director Cyber and Privacy — October 2022
2.
2 Document Classification: KPMG
Public © 2022 KPMG Advisory, a Belgian BV/SRL and a member firm of the KPMG global organization of independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee. All rights reserved. What is DORA? What is DORA? European Union (EU) Commission drafted the Digital Operational Resilience Act (DORA) which will have far-reaching impacts on EU financial institutions. Ratified in coming months, and rolled out over the following 2024 with enforcement from late 2023 What does it aim to do? DORA aims to provide a single set of rules to strengthen all financial institutions to withstand all types of information and telecommunications technology (ICT) disruptions and threats, including cyber. Why is it important? DORA widens the regulatory regime to include the risk from increasing interconnectedness, the shift to digital financial services and reliance on third party services. It also provides a consistent supervisory approach across a single market. What to keep in mind? The Basel Principles for the Sound Management of Operational Risk have also been revised. The principles on which operating models should be based are clearly defined. The NIS2 Directive will overlap with DORA.
3.
3 Document Classification: KPMG
Public © 2022 KPMG Advisory, a Belgian BV/SRL and a member firm of the KPMG global organization of independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee. All rights reserved. To whom might DORA apply? Credit institutions Payment institutions Crypto-asset service providers and issuers of: crypto-assets, asset-referenced tokens, significant asset-referenced tokens Electronic money institutions Investment firms Institutions for occupational retirement pensions Trade repositories Credit rating agencies Trading venues ICT third party service providers Managers of alternative investment funds Data reporting service providers Insurance and reinsurance undertakings Management companies Crowdfunding service providers Administrators of critical benchmarks Insurance intermediaries, reinsurance intermediaries and ancillary insurance intermediaries Securitisation repositories Statutory auditors and audit firms Central counterparties Central securities depositories DORA will apply to the entire financial sector, including critical third party providers (CTPPs), such as cloud computing, data analytics or software companies.
4.
4 Document Classification: KPMG
Public © 2022 KPMG Advisory, a Belgian BV/SRL and a member firm of the KPMG global organization of independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee. All rights reserved. What does it mean for you? Enforced regulation DORA is a new significant set of regulations that must be met. It will be backed up by an enforcement regime — for example, external review or fines equalling “1% of the average daily worldwide turnover of the critical ICT third party service provider in the preceding business year”. Current model may not be fit for purpose Although not as significant as GDPR, institutions will still need to comply and their current resiliency model may not be fit for purpose. Engage your legal team to support review of legislation specific requirements. Impacts all parts of the sector The scope of who is impacted is very wide. Transformation may be required As the regulatory environment is significantly changing and the supervisory regime is hardening, even mature organizations need to recognize that transformation to achieve compliance may be required. Cyber resilience arrangements may still not be suitable if DORA is met While DORA is a trigger for the transformation discussion, if there’s no interest, it’s worth noting that even with DORA compliance, cyber resilience arrangements may still not be suitable to meet the most difficult cyber challenges e.g. ransomware.
5.
5 Document Classification: KPMG
Public © 2022 KPMG Advisory, a Belgian BV/SRL and a member firm of the KPMG global organization of independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee. All rights reserved. Key areas of DORA DORA key areas Governance requirements Internal controls and governance structure Information sharing Exchange of cyber threat information and intelligence Third party risk Risk systems and tools to cover third parties risk and supervision ICT risk management ICT risk system and tools, including business continuity and disaster recovery Incident reporting Reporting thresholds and systems to communicate to regulators and users Operational resilience testing Testing for preparedness and weakness identification Today, DORA covers six key areas (contained in over 40 articles). Governance requirements Information sharing ICT risk management Incident reporting Operational resilience testing Third party risk
6.
6 Document Classification: KPMG
Public © 2022 KPMG Advisory, a Belgian BV/SRL and a member firm of the KPMG global organization of independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee. All rights reserved. Next steps to get started Establish a DORA programme for 2024 and appoint a programme director and sponsor 0 1. Develop a DORA board positioning paper 0 2. Define a Terms of Reference and build a business case to mobilise the DORA programme 0 3. Establish a governance forum and understanding where the DORA programme interacts with broader firm initiatives 0 4. Mobilisation of the design and delivery phases of the DORA programme 0 5.
7.
Some or all
of the services described herein may not be permissible for KPMG audit clients and their affiliates or related entities. The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. The KPMG name and logo are trademarks used under license by the independent member firms of the KPMG global organization. Document Classification: KPMG Public © 2022 KPMG Advisory, a Belgian BV/SRL and a member firm of the KPMG global organization of independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee. All rights reserved. Thomas Meyer Director – Cyber and Privacy thomasmeyer@kpmg.com +32 471 67 51 57
Download now