
Sign up to save your podcasts
Or
Jimi Piggott-Bader, Bas Jennen and Leonard van den Ende summarise the DORA rules for reporting incidents and significant cyber threats.
Leonard van den Ende: “DORA now prescribes that you have specific processes for identifying, tracking and logging ICT-related incidents.”
To download a copy of the guide, visit our website.
Jimi Piggott-Bader, Bas Jennen and Leonard van den Ende summarise the DORA rules for reporting incidents and significant cyber threats.
Leonard van den Ende: “DORA now prescribes that you have specific processes for identifying, tracking and logging ICT-related incidents.”
To download a copy of the guide, visit our website.